Continuous Auditing and Risk-Based Audit Planning
Continuous Auditing and Risk-Based Audit Planning
Continuous Auditing and Risk-Based Audit Planning
Abstract
tinuous Auditing (CA) is one possible way to meet these requirements. Specifically, the
Internal Audit Function (IAF) could use CA as an audit technique in order to add this
perspective to their risk assessment. This study examines factors associated with the use
of CA information in risk-based audit planning (RBAP) of the IAF. We use survey data
from 264 chief audit executives to address our research question. Consistent with our ex-
pectations, we find several factors having a significant positive influence on the use of CA
information in RBAP. From the IAF’s point of view these factors include the collaboration
with the external auditor, the use of rolling planning, the importance of the audit commit-
tee, the importance of data analysis in audit planning and the appropriation of results for
fraud prevention. Finally, we discuss the implications of these findings for research and
practice.
∗
Corresponding author: marc.eulerich@uni-due.de; University Duisburg-Essen, Mercator School of Manage-
ment, Chair for Internal Auditing
In a dynamic and globalized world, organizations are faced with the challenge of a con-
stantly changing environment. Because of these dynamic changes, the risk profile of organiza-
tions is constantly evolving. Considering that, there is a risk that serious developments during
the year will be overlooked in consequence of too cost-intensive risk analyses. The internal au-
dit function (IAF), as an objective and independent assurance body of an organization, should
have the abilities to recognize unfavorable developments immediately and to react to long-term
changes. To cover all relevant risks of an organization the standard 2010 of the international
standards of the internal audit profession requires that ”the chief audit executive must establish
a risk-based plan to determine the priorities of the internal audit activity, consistent with the
organization’s goals” (IIA, 2016).
To meet this requirement the IAF traditionally uses methods based on static and periodic
reviews of an organization’s risk profile (Allegrini and D’Onza, 2003; Coderre, 2005; Vasarhe-
lyi and Halper, 1991). As a consequence, potential changes in the risk landscape might not be
covered in the predefined audit plan. To add a more dynamic perspective in their risk-based
audit planning (RBAP) the IAF needs a paradigm shift in which the static risk assessment is
replaced by methods which make it possible to continuously scan the risk situation. Further-
more, the ongoing risk monitoring could reveal changes in prior defined risk indicators which
make it necessary to immediately adjust the audit plan.
Although Continuous Auditing (CA) has been a research subject since the paper of Groomer
and Murthy (1989) and numerous definitions have been created (e. g. AICPA (1999); Alles
et al. (2002); Helms and Mancino (1999); IIA (2005); Kogan et al. (1999); Rezaee et al. (2002);
Vasarhelyi and Halper (1991); Woodroof and Searcy (2001)), there is no common understand-
ing of the concept of CA yet. Also the terms ”Continuous Monitoring” and ”Continuous As-
surance” are not consistently defined, as some consider them to be synonymous with CA while
others see them as a part of CA or separated from each other (see e.g. Alles et al. (2003, 2006b);
Turoff et al. (2004); Warren Jr. and Smith (2006)).
The interpretation of the American Institute of Certified Public Accountants (AICPA) is
one of the most frequently used definitions. The AICPA defines CA as follows: ”A continuous
In order to answer the research question, hypotheses with the assumed causal relationships
are tested for their validity in an ordinal logistic regression model. Using a multinational data
set from three countries and a total of 264 observations, we include five different independent
variables to analyze potential effects that influence the use of CA as a source of information for
RBAP. In addition, selected company characteristics are included as control variables, like in-
dustry type, listing status and size of the firm. Our dependent variable measures the intensity of
use of CA information in RBAP. Based on the theoretical considerations and previous research
work, the use of CA in the RBAP is analyzed from different perspectives to identify and dis-
cuss the main drivers behind this use. Furthermore, an additional analysis is performed to gain
insights about potential outcomes of the use of CA information in audit planning. Finally, the
validated results are discussed against the background of their importance for Internal Audit.
The remainder of this paper is organized as follows. The next section presents the current
literature and develops the necessary hypotheses for our empirical approach. Section three
describes the empirical model, the data set and illustrates the descriptive and regression results.
Section four discusses our results and presents our conclusion.
The concept of CA is part of the academic literature for almost three decades and was first
introduced by the works of Groomer and Murthy (1989) and Vasarhelyi and Halper (1991).
In the years that followed, there has been an increasing amount of literature on CA including
A large and growing body of literature has investigated the relation between internal and ex-
ternal auditor who both can be seen as cornerstones of corporate governance (Gramling et al.,
2004). In particular, the reliance decision of the external auditor on the IAF has been in the
focus of research and is linked to several outcome effects such as effects on litigation risk,
audit efficiency, audit fees and financial reporting quality (Bame-Aldred et al., 2013). In addi-
tion, the regulatory attention on this issue has increased in the past two decades. The Auditing
Standard No. 5 of the Public Company Accounting Oversight Board (PCAOB) encourages
the external auditor to use the relevant results of internal audit activities after the verification
of IAF’s competence and objectivity (PCAOB, 2007). The external auditor should cooperate
with the IAF to obtain more ”evidence about the effectiveness of internal control over financial
reporting” (PCAOB, 2007). Thus, the external auditor has an incentive to use IAF’s results in
its own audit work while the extent of this cooperation depends on external auditor’s evalua-
tion of the IAF’s quality. From the perspective of internal auditors the reliance decision of the
external auditor can be seen as an objective quality indicator for their work respectively their
competence and objectivity. According to the IIA’s performance standard 2050, the CAE is
encouraged to coordinate the IAF’s activities with other corporate governance protagonists and
Hypothesis 1. The higher the importance of collaboration with the external auditor, the
more likely the use of CA information in the RBAP of the IAF.
The IAF must plan both its audit and consulting assignments to best perform its tasks and
to ensure that its priorities are consistent with and support the organizational objectives. In
doing so, the IAF must develop an (multi-) annual plan, which covers the audit engagements
to be carried out for this time period and also a plan for each individual audit engagement.
According to the IIA standard 2010, the CAE must establish a risk-based audit plan. The
standard further requires that the CAE periodically review and if necessary adjust this audit
plan to respond changes in risk (IIA, 2016). The risks must be identified and assessed at least
once a year (IIA, 2016), standard 2010.A1, but due to globalization and digitalization risks are
changing continuously and faster than ever. Because of the dynamic risk environment risk-
based audit planning becomes more and more difficult for the IAF and a more flexible audit
plan is necessary.
Therefore, it is necessary to continuously monitor and evaluate the risks in the company.
Only an annual assessment of the risks by the IAF can be dangerous e.g. if a previously un-
known or existing low risk develops very quickly, but is not included in the audit plan due to
the assessment already carried out. However, it is not sufficient to monitor the risks contin-
uously, but it is also necessary to adjust the RBAP according to the results from the CA, as
otherwise potential changes would not be included in the audit plan. Therefore, a modern and
highly qualified IAF does not use annual risk-based planning, but a continuous risk-based audit
planning as a rolling forecast. In the case of this rolling audit planning, the audit plan is also
adjusted during the year if changes are required. Previous studies have found that investing in
audit technologies such as CA improves the breadth and depth of audit coverage (Baker, 2009;
Protiviti, 2017). IAFs, which are modern and of high quality, are more likely to rely on CA
in risk-based audit planning, as CA also implements a modern and good IAF. In addition, CA
supports continuous risk identification and assessment.
For this reason, it appears decent that if the RBAP is created on the basis of rolling plan-
ning, then we would expect a positive effect on the use of CA information in risk-based audit
planning.:
According to the IIA definition of Internal Auditing, the objective of the IAF is to create added
value through its assurance and consulting services and to support the organization in achieving
its objectives (IIA, 2016). Accordingly, there is a high level of interest in the results of audit
work and internal audit reports. The standard 1111 demands that ”the CAE must communicate
and interact directly with the board” (IIA, 2016). The board also includes the Audit Committee
(AC). Interaction and communication with the board is further defined in the standards: When
planning, the IAF must take into account not only the input of the senior management but also
that of the board, standard 2010.A1 (IIA, 2016). Likewise, the CAE, in accordance with stan-
dards 2010.A2 and 2410.A1, identify the expectations of the Senior Management and the Board
regarding the IAF‘s assessments and conclusions and consider them in the final communication
of engagement results (IIA, 2016). According to standard 2020, the board must also approve
the audit planning of the IAF (IIA, 2016).
Previous research have found a positive association between greater oversight of the AC
and greater IAF independence (Carcello et al., 2005). One explanation for this association is
that if the senior management has more impact on the IAF than the AC, it may reduce the
independence and objectivity of the IAF. This is so as the IAF fears negative consequences if
it challenges decisions of the senior management (Cohen et al., 2010). There are a few studies,
which figured out, that most IAFs periodically reports to the AC (Allegrini and D’Onza, 2003;
Prawitt et al., 2009). In this context, reporting directly to the AC is mainly used as an IAF
measure of independence and objectivity (Prawitt et al., 2009), which in turn is seen as a major
factor of IAF quality (Abbott et al., 2016). As a supervisory body, the AC is particularly
interested in fact-based reporting in which the individual results are clearly traceable. The
use of CA in audit planning supports this, as deviations can be directly identified through
continuous monitoring and the audit planning is thus fact-based and less influenced by the
expectations of the senior management. Therefore, if the AC is of high importance to the IAF,
Data Analytics
The IAF must plan each individual audit and advisory mission in terms of the objective pursued,
the scope, the time line and the resources required (IIA (2016), standard 2200 and 2201). In
order to determine the individual components, it is necessary to identify and assess the risks
within the auditee and the controls already implemented to mitigate these risks. For the purpose
of this audit preparation, data analytics are often used. According to Standard 1220.A2, internal
auditors ”must consider the use of technology-based audit and other data analysis techniques”
(IIA, 2016).
Tools for data analytics have many different advantages for the IAF, which are also repeat-
edly examined in the literature. This includes increasing the efficiency of audit engagements,
expanding audit coverage or identifying trends (Baker, 2009; Protiviti, 2017). Some research
papers conclude that data analytics increases the independence of internal auditors (Baker,
2009). There are several studies that examine the use of data analysis by the IAF. It turns out
that most of the IAFs use data analysis in form of ACL, Microsoft Excel and Access, IDEA
or similar software tools (Baker, 2009). Having a strong focus on data-driven internal auditing
helps the internal auditors and the whole function to include modern work methodologies in the
audit process. Thus, it seems appropriate that if the IAF uses data analytics in audit preparation,
we would expect also a positive effect on the use of CA information in the RBAP.
Hypothesis 4. The more the IAF uses data analysis in audit preparation, the more likely
the use of CA information in risk-based audit planning of the IAF.
Fraud Prevention
The prevention and detection of fraudulent activities is a main challenge for IAF (Coderre,
2005). According to the IIA, standard 1210.A2, ”Internal Auditors must have sufficient knowl-
10
Hypothesis 5. The higher the usage of IAF results for fraud prevention, the more likely
the use of CA information in risk-based audit planning of the IAF.
11
In order to empirically test our conceptual model, we rely on data from CAEs. We collected
data together with the Austrian, German and Swiss Institute of Internal Auditors. The study
covers around 90 questions from different topics of the internal audit profession and tries to
identify common best practices and recent changes and trends. All questions were developed
together with the three institutes to guarantee and high level of relevance for the practitioners
on the one hand and use common quality standards for research on the other. The survey qas
pretested by 7 internal auditors.
The study is a by-invitation-only survey and addressed to 2,450 CAEs. The sample represents
a broad variety of industries and sizes. The type of respondents (CAEs) combined with the
various industries, sizes and the three regulatory regimes can be seen as a good starting point
for our study.
From the invited CAEs a total number of 417 responses were collected, which is a response
rate of 17.02 percent. Because of missing answers in the full sample, the distribution of the
sample may vary.1 For our model we only include those observations, which answered all
relevant variables completely. We hence end up with a relevant subsample of 264 answers.
Overall, the questionnaire consists of 105 different closed and open questions and was com-
pletely anonymous.
Variables
We use a dependent variable which measures the usage of information from CA/Continuous
Monitoring for the RBAP. The variable has a five-point likert scale from “very low” to “very
high”.2 The independent variable Collaboration ExtAud measures the importance of the rela-
tionship to the external auditor also on a five point likert scale from the perspective of the IAF.
The scale reaches from “very low” to “very high”. In addition, there is the value ”0”, which
indicates that the IAF does not cooperate with the external auditor. Our variable RollPlanning
1 The
respondents had the chance to skip single questions or just do not answer a specific one.
2 Howcan you make sure the interviewees know the concept of CA and the sample you have really have CA
implemented?
12
Analytical approach
The analytical approach consists of two major elements. First, we expose the data to descriptive
analyses in order to get first insights into their composition. Second, we take an exploratory
approach and test the hypotheses by use of suitable multivariate techniques. All analyses are
conducted using STATA. The descriptive analyses presents the composition of the sample as
well as the distribution of our used variables. It focuses on the frequencies and values of the
different variables. The hypothesis tests are about the multivariate effects of different factors
on our dependent variable. We apply an ordered logistic regression to estimate the parameters
13
All regressions use robust standard errors, such that single standard errors are estimated and
heteroscedasticity can be ignored. The estimated coefficients are constant, but the standard
errors will slightly shift.
Descriptive Results
Table 1 presents the descriptive results for our 264 firms. Our main dependent variable CAAu-
ditplan has a mean value of 2.346 and a standard deviation of 1.250. Our variables with a
focus on potential stakeholders Collaboration ExtAud and Importance AC show, that the sam-
ple companies evaluate the importance of the collaboration with the external auditor with an
average of 3.385 and the importance of the audit committee with an average of 2.612. Never-
theless, this does not indicate that the collaboration with the external auditor is more important
for IAFs compared to the AC, due to different underlying questions. The rolling planning vari-
able has a mean of 2.382. Our variable about the use of data analysis for the preparation of an
audit engagement has the mean of 4.084 on a five-point likert scale, so that the majority of the
companies in our sample use data analysis before an audit engagement. The results of the IAF
are often used for fraud purposes, since the variable Results Fraud has a mean of 3.356.
We also include different control variables. The variable Industry shows that 30.7 percent
of the company in our sample are from financial industry (mean of 0.307). We also cover the
listing status of the organization in the dummy variable Listing, which has a mean of 0.423.
Thus, most of the companies are from the non-financial industry and there are more non-listed
than listed companies in our sample. The natural logarithm of total number of employees
(Ln Employees) has a mean of 7.975 and a standard deviation of 1.886. Our control variable
about the staffing arrangement has a mean value of 2.273 (Objective MTG) on a five-point likert
3 The focus of our study is to present general results about the use of CA in RBAP. Thus, we did not focus on
14
Table 2 shows the correlation matrix and the significance levels for all variables. We do not
have variables with a high cross-correlation and most of the single correlations are significant.
Thus, we conclude that the sample does not appear to have a multicollinearity problem.
Empirical Results
Our final ordered logistic regression consists of nine independent variables and a total of 264
observations. We find significant effects for 8 out of 9 variables. The Pseudo-R2 for our model
2 of 76.69. All regression results are
is 0.098 with a Log-likelihood of -351.501 and a χ(9)
presented in Table 2.
We find a significant positive effect of Collaboration ExtAud (0.425***) on the use of CA
in audit planning. Thus, companies which collaborate more with the external auditor tend to use
CA for their risk-based audit planning process. Importance AC has also a significant positive
effect (0.132**) on CA. IAFs which evaluate the AC as important tend to use more often CA.
As expected, the importance of the cooperation with the examined stakeholders are associated
with a higher use of CA information in the RBAP of the IAF, which provides support for H1
and H3. Additionally, our analysis finds another significant positive effect for RollPlanning
(0.220***), providing support for H2. This represents the positive effect of the usage of rolling
audit planning to regularly update the RBAP on the intention to use CA information in risk-
based audit planning. Having a strong focus on DataAnalysis for the preparation of an audit
engagement has also a positive significant effect on CA usage (0.396***), providing support for
H4. Our last independent variable Results Fraud shows a significant positive effect (0.400***),
indicating that IAFs with a stronger focus on fraud prediction will use information from CA
for their RBAP. Thus, our last hypothesis H5 is also supported by the results.
15
This additional analysis should shed light on the question, if CA in the context of the RBAP
really matters. We use the control variables from our prior model and let our prior dependent
variable CAAuditplan now be the independent. All results are presented in table 4. The results
indicate that the use of CA in the RBAP is associated with higher intensity of use of IAF’s
results by the AC Int AC, the supervisory board Int SupBoard, the management Int CLevel,
the external auditor Int ExtAud and the auditee Int Auditee. Consistent with these findings, our
variable Sum Int, which add up all intensity variables, has a statistically significant positive
coefficient. Furthermore, the results show that the perception of the IAF’s value adding role
Adds Value is positively affected by the use of CA information in the RBAP. Finally, we also
document a statistically significant positive coefficient of Noaudits indicating that the use of
CA information in the RBAP enables the IAF to perform more audits.
16
The purpose of this study is to identify and examine factors associated with the use of CA
information in risk-based audit planning of the IAF. One possible argumentation for using CA
as an input for the RBAP can be seen in the dynamization of the risk assessment (Coderre,
2005). A large number of previous studies on this topic have discussed the potential use of
information from CA as an instrument to meet the requirements of an increasing risk orientation
in companies as well as factors influencing the implementation of CA. There are only a few
prior studies empirically analyzing the antecedents of the actual use of CA information in
practice (Gonzalez et al., 2012; Vasarhelyi et al., 2012). This limitation could be mitigated
through the setup of our study. We expect that the importance of cooperation with different
stakeholders, namely the AC and the external auditor, and the relevance of data analysis in audit
planning has a positive influence on the use of CA information in risk-based audit planning of
IAFs. Moreover, we hypothesize that the application of rolling planning in the RBAP and the
appropriation of IAF results for fraud prevention positively affect the use of CA information as
a source of the RBAP.
An ordinal logistic regression analysis is used to answer our research question. Using a
sample of 264 survey responses of CAEs, the findings show that the examined factors have a
statistically significant positive effect on the use of CA information in risk-based audit planning.
In the following, we discuss the results of our regression and the implications of the findings
for research and practice. The results of our model show that the more important the IAF’s
collaboration with the external auditor, the more likely is the extent to which the IAF relies
on information from CA as part of the RBAP. Especially, the usage of CA in the context of
financial reporting quality as well as of an effective internal control system, helps both, the
external and internal auditor. In this context, CA supports an efficient collaboration between
them and helps to avoid duplicate audits and to reduce audit fees.
With increasing importance of rolling audit planning, the extent to which CA acts as a
source of information increases. E.g. based on pre-programmed checks and routines, CA is
17
18
19
Abbott, L. J., Daugherty, B., Parker, S., and Peters, G. F. (2016). Internal Audit Quality and Fi-
nancial Reporting Quality: The Joint Importance of Independence and Competence. Journal
of Accounting Research, 54(1):3–40.
Abbott, L. J., Parker, S., and Peters, G. F. (2012). Audit Fee Reductions from Internal Audit-
Provided Assistance: The Incremental Impact of Internal Audit Characteristics. Contempo-
rary Accounting Research, 29(1):94–118.
AICPA (1999). Continuous auditing research report. American Institute of Certified Public
Accountants.
Allegrini, M. and D’Onza, G. (2003). Internal Auditing and Risk Assessment in Large Italian
Companies: an Empirical Survey. International Journal of Auditing, 7(3):191–208.
Alles, M., Kogan, A., and Vasarhelyi, M. A. (2003). Black box logging and teritiary monitoring
of continuous auditing systems. Information Systems Control Journal, 1:37–41.
Alles, M. G., Brennan, G., Kogan, A., and Vasarhelyi, M. A. (2006a). Continuous monitoring
of business process controls: A pilot implementation of a continuous auditing system at
Siemens. International Journal of Accounting Information Systems, 7(2):137–161.
Alles, M. G., Kogan, A., and Vasarhelyi, M. A. (2002). Feasibility and economics of continuous
assurance. Auditing, 21(1):125–138.
Alles, M. G., Kogan, A., and Vasarhelyi, M. A. (2008). Putting Continuous Auditing Theory
into Practice: Lessons from Two Pilot Implementations. Journal of Information Systems,
22(2):195–214.
Alles, M. G., Riccio, E. L., Vasarhelyi, M. A., and Tostes, F. (2006b). Continuous Auditing: the
USA Experience and Considerations for its Implementation in Brazil. Journal of Information
Systems and Technology Management, 3(2):211–224.
20
Bame-Aldred, C. W., Brandon, D. M., Messier, W. F., Rittenberg, L. E., and Stefaniak, C. M.
(2013). A summary of research on external auditor reliance on the internal audit function.
Auditing: A Journal of Practice and Theory, 32(suppl.1):251–286.
Bierstaker, J., Janvrin, D., and Lowe, D. J. (2014). What factors influence auditors’ use of
computer-assisted audit techniques? Advances in Accounting, 30(1):67–74.
Braun, R. L. and Davis, H. E. (2003). Computer-assisted audit tools and techniques: Analysis
and perspectives. Managerial Auditing Journal, 18(9):725–731.
Brown, C. E., Wong, J. A., and Baldwin, A. A. (2007). A Review and Analysis of the Existing
Research Streams in Continuous Auditing. Journal of Emerging Technologies in Accounting,
4(1):1–28.
Carcello, J. V., Eulerich, M., Masli, A., and Wood, D. A. (2018). The Value to Management of
Using the Internal Audit Function as a Management Training Ground. Accounting Horizons,
32(2):121–140.
Carcello, J. V., Hermanson, D. R., and Raghunandan, K. (2005). Factors Associated with U. S.
Public Companies’ Investment in Internal Auditing. Accounting Horizons, 19(2):69–84.
Chiu, V., Liu, Q., and Vasarhelyi, M. A. (2014). The development and intellectual structure of
continuous auditing research. Journal of Accounting Literature, 33(1-2):37–57.
Coderre, D. (2005). Continuous Auditing : Implications for Assurance , Monitoring , and Risk
Assessment. The Institute of Internal Auditors-Global Technology Audit Guide, pages 1–33.
21
Coram, P., Ferguson, C., and Moroney, R. (2008). Internal audit, alternative internal audit struc-
tures and the level of misappropriation of assets fraud. Accounting & Finance, 48(4):543–
559.
Davidson, B. I., Desai, N. K., and Gerard, G. J. (2013). The Effect of Continuous Auditing
on the Relationship between Internal Audit Sourcing and the External Auditor’s Reliance on
the Internal Audit Function. Journal of Information Systems, 27(1):41–59.
Debreceny, R., Gray, G. L., Jun-Jin Ng, J., Lee, K. S.-P., and Yau, W.-F. (2005). Embedded
audit modules in enterprise resource planning systems: Implementation and functionality.
Journal of Information Systems, 19(2):7–27.
Eulerich, M. and Kalinichenko, A. (2015). The Current State and Future Directions of Con-
tinuous Auditing Research An Analysis of the Existing Literature. Journal of International
Accounting Research, 90(4):1395–1435.
EY (2018). How can you disrupt risk in an era of digital transformation ? Analytics Survey
2018.
Glover, S. M., Prawitt, D. F., and Wood, D. A. (2008). Internal audit sourcing arrangement and
the external auditor’s reliance decision. Contemporary Accounting Research, 25(1):193–213.
22
Gramling, A. A., Maletta, M. J., Schneider, A., and Church, B. K. (2004). The role of the
internal audit function in corporate governance: A synthesis of the extant internal auditing
literature and directions for future research. Journal of Accounting Literature, 23:194–244.
Hardy, C. A. (2014). The Messy Matters of Continuous Assurance: Findings from Exploratory
Research in Australia. Journal of Information Systems, 28(2):357–377.
Haynes, R. and Li, C. (2016). Continuous Audit and Enterprise Resource Planning Systems: A
Case Study of ERP Rollouts in the Houston, TX Oil and Gas Industries. Journal of Emerging
Technologies in Accounting, 13(1):171–179.
Helms, G. L. and Mancino, J. M. (1999). Information technology issues for the attest, audit
and assurance services functions. CPA Journal, 69(5):62–63.
IIA (2005). Continuous Auditing : Implications for Assurance , Monitoring , and Risk Assess-
ment. Global Technology Audit Guide, 3:1–33.
IIA (2016). International standards for the professional practice of internal auditing. pages
1–22.
Janvrin, D., Bierstaker, J. L., and Lowe, D. J. (2009). An Investigation of Factors Influencing
the Use of Computer-Related Audit Procedures. Journal of Information Systems, 23(1):1–22.
Kearns, G. S., Barker, K. J., and Danese, S. P. (2011). Developing a Forensic Continuous Audit
Model. Journal of Digital Forensics, Security and Law, 6(2):93.
Kogan, A., Sudit, E. F., and Vasarhelyi, M. A. (1999). Continuous Online Auditing: A Program
of Research. Journal of Information Systems, 13(2):87–103.
23
Kuhn Jr., J. R. and Sutton, S. G. (2006). Learning from WorldCom: through Continuous
Assurance. Journal of Emerging Technologies in Accounting, 3(1):61–80.
Mahzan, N. and Lymer, A. (2014). Examining the adoption of computer-assisted audit tools
and techniques: Cases of generalized audit software use by internal auditors. Managerial
Auditing Journal, 29(4):327–349.
Malaescu, I. and Sutton, S. G. (2015). The Reliance of External Auditors on Internal Audit’s
Use of Continuous Audit. Journal of Information Systems, 29(1):95–114.
Omoteso, K., Patel, A., and Scott, P. (2008). An Empirical Examination of Competing Theo-
ries to Explain Continuous Disclosure Technology Adoption Intentions Using XBRL as the
Example Technology. International Journal of Digital Accounting Research, 8(14):45–79.
PCAOB (2007). Auditing Standard No. 5 - An audit of internal control over financial reporting
that is integrated with an audit of financial statements. Exchange Organizational Behavior
Teaching Journal.
Prawitt, D. F., Smith, J. L., and Wood, D. A. (2009). Internal audit quality and earnings man-
agement. Accounting Review, 84(4):1255–1280.
Rezaee, Z., Sharbatoghlie, A., Elam, R., and McMickle, P. L. (2002). Continuous audit-
ing: Building automated auditing capability. Auditing: A Journal of Practice and Theory,
21(1):147–163.
Rikhardsson, P. and Dull, R. (2016). An exploratory study of the adoption, application and
impacts of continuous auditing technologies in small businesses. International Journal of
Accounting Information Systems, 20:26–37.
Shin, I.-h., Lee, M.-g., and Park, W. (2013). Implementation of the continuous auditing system
in the ERP-based environment. Managerial Auditing Journal, 28(7):592–627.
24
Turoff, M., Chumer, M., Hiltz, S. R., Klashner, R., Alles, M., Vasarhelyi, M. A., and Kogan,
A. (2004). Assuring homeland security: Continuous monitoring, control & assurance of
emerging preparedness. Journal of Information Technology Theory and Application, 6(3):1–
24.
Vasarhelyi, M. A., Alles, M. G., Kuenkaikaew, S., and Littley, J. (2012). The acceptance and
adoption of continuous auditing by internal auditors: A micro analysis. International Journal
of Accounting Information Systems, 13(3):267–281.
Vasarhelyi, M. A. and Halper, F. B. (1991). The Continuous Audit of Online Systems. Auditing:
A Journal of Practice and Theory, pages 110–125.
Warren Jr., J. D. and Smith, L. M. (2006). Continuous Auditing: an Effective Tool for Internal
Auditors. Working Paper, 21(2):27–35.
Woodroof, J. and Searcy, D. W. (2001). Continuous audit: Model development and imple-
mentation within a debt covenant compliance domain. International Journal of Accounting
Information Systems, 2(3):169–191.
25
26
Variables (1) (2) (3) (4) (5) (6) (7) (8) (9) (10)
CA Auditplan (1) 1.000
27
(0.000) (0.643) (0.092) (0.820)
Results Fraud (6) 0.308 0.173 0.121 0.117 0.229 1.000
(0.000) (0.001) (0.025) (0.028) (0.000)
Industry (7) 0.110 0.351 0.045 0.184 -0.021 -0.079 1.000
(0.045) (0.000) (0.391) (0.000) (0.679) (0.127)
Listing (8) -0.018 0.237 -0.004 0.400 -0.044 0.113 0.177 1.000
(0.749) (0.000) (0.943) (0.000) (0.394) (0.034) (0.000)
Ln Employees (9) -0.052 -0.059 0.071 0.197 0.064 0.160 -0.359 0.242 1.000
(0.347) (0.250) (0.172) (0.000) (0.207) (0.002) (0.000) (0.000)
Objectives MTG (10) 0.170 0.098 0.176 0.133 0.098 0.193 -0.063 0.198 0.331 1.000
N 264
Pseudo R2 0.098
Log-likelihood -351.501
2
χ(9) 76.69
Significance levels: † : 10% ∗ : 5% ∗∗ : 1%
28
Independent Variable Sum Int Int AC Int SupBoard Int CLevel Int ExtAud Int Auditee Adds Value Noaudits
29
LN Employees .1692** .1880** .1283* .0210 -.0131 .0870 .0394 .8072***
Objectives MTG .1575 .1750* .0990 .0881 .0441 .1446 -.0285 .0740
No. Obs. 181 214 250 305 288 302 304 304