{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T00:30:28Z","timestamp":1777336228811,"version":"3.51.4"},"reference-count":109,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2019,7,9]],"date-time":"2019-07-09T00:00:00Z","timestamp":1562630400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,7,9]],"date-time":"2019-07-09T00:00:00Z","timestamp":1562630400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cogn Tech Work"],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1007\/s10111-019-00581-4","type":"journal-article","created":{"date-parts":[[2019,7,9]],"date-time":"2019-07-09T13:19:54Z","timestamp":1562678394000},"page":"565-583","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":50,"title":["Determinants adoption of computer-assisted auditing tools (CAATs)"],"prefix":"10.1007","volume":"22","author":[{"given":"Isabel","family":"Pedrosa","sequence":"first","affiliation":[]},{"given":"Carlos J.","family":"Costa","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4261-0344","authenticated-orcid":false,"given":"Manuela","family":"Aparicio","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,9]]},"reference":[{"key":"581_CR1","volume-title":"Adoption of generalised audit software (GAS) by external auditors in the UK","author":"A Ahmi","year":"2012","unstructured":"Ahmi A (2012) Adoption of generalised audit software (GAS) by external auditors in the UK. Brunel University, London"},{"issue":"2","key":"581_CR2","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1108\/02686901311284522","volume":"28","author":"A Ahmi","year":"2012","unstructured":"Ahmi A, Kent S (2012) The utilisation of generalized audit software (GAS) by external auditors. Manag Audit J 28(2):88\u2013113","journal-title":"Manag Audit J"},{"issue":"August","key":"581_CR3","doi-asserted-by":"crossref","first-page":"591","DOI":"10.1016\/j.sbspro.2014.11.151","volume":"164","author":"A Ahmi","year":"2014","unstructured":"Ahmi A, Saidin SZ, Abdullah A (2014) IT adoption by internal auditors in public sector: a conceptual study. Proc Soc Behav Sci 164(August):591\u2013599","journal-title":"Proc Soc Behav Sci"},{"key":"581_CR4","volume-title":"Audit and accounting guide : computer assisted audit techniques","author":"AICPA","year":"1979","unstructured":"AICPA (1979a) Audit and accounting guide : computer assisted audit techniques. AICPA, Durham"},{"key":"581_CR5","volume-title":"Computer-assisted audit techniques","author":"AICPA","year":"1979","unstructured":"AICPA (1979b) Computer-assisted audit techniques. AICPA, Durham"},{"key":"581_CR6","volume-title":"Statement on auditing standards no. 48\u2014the effects of computer processing on the examination of financial statements","author":"AICPA","year":"1984","unstructured":"AICPA (1984) Statement on auditing standards no. 48\u2014the effects of computer processing on the examination of financial statements. AICPA, Durham"},{"key":"581_CR7","unstructured":"AICPA (2001) SAS no. 94\u2014the effect of information technology on the auditor\u2019s consideration of internal control in a financial statement audit. \nhttp:\/\/www.garyportercpa.com\/index.php?option=com_contentandview=articleandid=127:sas-no-94-new-standards-on-technology-and-internal-controlandcatid=2:audit-articlesandItemid=18\n\n. Accessed 1 Feb 2012"},{"key":"581_CR8","unstructured":"AICPA (2002) SAS no. 99\u2014AU section\u00a0316 consideration of fraud in a financial. \nhttp:\/\/www.aicpa.org\/Research\/Standards\/AuditAttest\/DownloadableDocuments\/AU-00316.pdf\n\n. Accessed 10 Oct 2018"},{"key":"581_CR9","volume-title":"SAS no. 116\u2014interim financial information","author":"AICPA","year":"2009","unstructured":"AICPA (2009) SAS no. 116\u2014interim financial information. AICPA, Durham"},{"key":"581_CR10","unstructured":"AICPA (2011) AICPA\u2014CPA CPE requirements: continuing professional education. \nhttp:\/\/www.aicpa.org\/cpeandconferences\/cperequirements\/pages\/cperequirements.aspx\n\n. Accessed 2 Nov 2012"},{"key":"581_CR11","volume-title":"2012 top technology initiatives survey results","author":"AICPA","year":"2012","unstructured":"AICPA (2012) 2012 top technology initiatives survey results. AICPA, Durham"},{"key":"581_CR12","unstructured":"AICPA (2013) North American accounting professionals see data oversight as top priority for technology. \nhttp:\/\/www.aicpa.org\/Press\/PressReleases\/2013\/Pages\/North-America\n\n. Accessed 10 Oct 2018"},{"key":"581_CR13","unstructured":"AICPA (2014) AICPA\u2014statements on auditing standards. \nhttp:\/\/www.aicpa.org\/Research\/Standards\/AuditAttest\/Pages\/SAS.aspx\n\n. Accessed 24 Jan 2014"},{"key":"581_CR14","doi-asserted-by":"publisher","DOI":"10.5539\/ass.v9n10p307","author":"AA Al-Ansi","year":"2013","unstructured":"Al-Ansi AA, Ismail NA, Al-Swidi AK (2013) The effect of IT knowledge and IT training on the IT Utilization among external auditors: evidence from Yemen. Asian Soc Sci. \nhttps:\/\/doi.org\/10.5539\/ass.v9n10p307","journal-title":"Asian Soc Sci"},{"issue":"2","key":"581_CR15","first-page":"23","volume":"9","author":"A Ali","year":"2009","unstructured":"Ali A, Ahmi A, Ghazali MZ, Gloeck JD, Tunku U, Rahman A (2009) Internal audit in the federal organizations of Malaysia: is there light at the end of the long dark tunnel? Faculty of accountancy and management. South Afr J Account Audit Res 9(2):23\u201338","journal-title":"South Afr J Account Audit Res"},{"key":"581_CR03","unstructured":"ASB (2011) Extant AU sections mapped to clarity SASs. Available at: \nhttps:\/\/www.aicpa.org\/research\/standards\/auditattest\/asb\/downloadabledocuments\/clarity\/au_sections_mapped_to_proposed_sass.pdf\n\n. Accessed Oct 2017"},{"issue":"1","key":"581_CR16","first-page":"64","volume":"30","author":"J Bierstaker","year":"2013","unstructured":"Bierstaker J, Janvrin D, Lowe DJ (2013) What factors influence auditors\u2019 use of computer-assisted audit techniques? Adv Account 30(1):64\u201374","journal-title":"Adv Account"},{"issue":"9","key":"581_CR17","doi-asserted-by":"crossref","first-page":"725","DOI":"10.1108\/02686900310500488","volume":"18","author":"RL Braun","year":"2003","unstructured":"Braun RL, Davis HE (2003a) Computer-assisted audit tools and techniques: analysis and perspectives. Manag Audit J 18(9):725\u2013731","journal-title":"Manag Audit J"},{"issue":"9","key":"581_CR18","doi-asserted-by":"crossref","first-page":"725","DOI":"10.1108\/02686900310500488","volume":"18","author":"RL Braun","year":"2003","unstructured":"Braun RL, Davis HE (2003b) Computer-assisted audit tools and techniques: analysis and perspectives. Manag Audit J 18(9):725\u2013731","journal-title":"Manag Audit J"},{"key":"581_CR19","volume-title":"Evolution of auditing: from the traditional approach to the future audit\u2014white paper","author":"PE Byrnes","year":"2012","unstructured":"Byrnes PE, Gullvist B, Brown-Liburd H, Teeter R, Mcquilken D, Vasarhelyi M (2012) Evolution of auditing: from the traditional approach to the future audit\u2014white paper. AICPA, Durham"},{"key":"581_CR20","first-page":"285","volume":"71","author":"PE Byrnes","year":"2015","unstructured":"Byrnes PE, Al-Awadhi CA, Gullvist B, Brown-Liburd H, Teeter CR, Warren JD Jr, Vasarhelyi M (2015) Evolution of auditing: from the traditional approach to the future audit. Audit Analytics 71:285\u2013297","journal-title":"Audit Analytics"},{"key":"581_CR21","unstructured":"Canadian Institute of Chartered Accountants. (1967). Audiotape for management and the auditor. In: 65th Annual Conference of Canadian Institute of Chartered Accountants, p 38"},{"issue":"4","key":"581_CR22","first-page":"813","volume":"2","author":"JI Cash","year":"1977","unstructured":"Cash JI, Bailey AD, Whinston AB (1977) A survey of techniques for auditing EDP-based accounting information systems. Account Rev 2(4):813\u2013832","journal-title":"Account Rev"},{"issue":"4","key":"581_CR23","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1080\/07421222.2002.11045699","volume":"18","author":"PYK Chau","year":"2002","unstructured":"Chau PYK, Hu PJ (2002) Examining a model of information technology acceptance by individual an exploratory professionals: study. J Manag Inf Syst 18(4):191\u2013229","journal-title":"J Manag Inf Syst"},{"issue":"2","key":"581_CR24","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1016\/j.accinf.2007.10.002","volume":"9","author":"MB Curtis","year":"2008","unstructured":"Curtis MB, Payne EA (2008) An examination of contextual factors and individual characteristics affecting technology implementation decisions in auditing. Int J Account Inf Syst 9(2):104\u2013121. \nhttps:\/\/doi.org\/10.1016\/j.accinf.2007.10.002","journal-title":"Int J Account Inf Syst"},{"issue":"4","key":"581_CR25","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1108\/MAJ-07-2013-0903","volume":"29","author":"MB Curtis","year":"2014","unstructured":"Curtis MB, Payne E (2014) Modeling voluntary CAAT utilization decisions in auditing. Manag Audit J 29(4):304\u2013326. \nhttps:\/\/doi.org\/10.1108\/MAJ-07-2013-0903","journal-title":"Manag Audit J"},{"issue":"1","key":"581_CR26","first-page":"79","volume":"23","author":"MB Curtis","year":"2009","unstructured":"Curtis MB, Jenkins JG, Bedard JC (2009) Auditors\u2019 training and proficiency in information systems: a research synthesis. J Inf Syst 23(1):79\u201396","journal-title":"J Inf Syst"},{"issue":"3","key":"581_CR27","doi-asserted-by":"crossref","first-page":"319","DOI":"10.2307\/249008","volume":"13","author":"FD Davis","year":"1989","unstructured":"Davis FD (1989) Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q 13(3):319\u2013340","journal-title":"MIS Q"},{"key":"581_CR04","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1006\/imms.1993.1022","volume":"38","author":"FD Davis","year":"1993","unstructured":"Davis FD (1993) User acceptance of information technology: system characteristics, user perceptions and behavioral impacts. Int J Man Mach Stud 38:475\u2013487. \nhttps:\/\/doi.org\/10.1006\/imms.1993.1022","journal-title":"Int J Man Mach Stud"},{"key":"581_CR29","first-page":"7","volume":"19","author":"RS Debreceny","year":"2005","unstructured":"Debreceny RS, Gray G, Ng JJ-J, Lee KS-P, Yau W-F (2005) Embedded audit modules in enterprise resource planning systems: implementation and functionality. J Inf Syst 19:7\u201327","journal-title":"J Inf Syst"},{"issue":"1","key":"581_CR30","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1287\/isre.3.1.60","volume":"3","author":"WH DeLone","year":"1992","unstructured":"DeLone WH, McLean ER (1992) Information systems success: the quest for the dependent variable. Inf Syst Res 3(1):60\u201395. \nhttps:\/\/doi.org\/10.1287\/isre.3.1.60","journal-title":"Inf Syst Res"},{"issue":"3","key":"581_CR31","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1007\/s11747-011-0300-3","volume":"40","author":"A Diamantopoulos","year":"2012","unstructured":"Diamantopoulos A, Sarstedt M, Fuchs C, Wilczynski P, Kaiser S (2012) Guidelines for choosing between multi-item and single-item scales for construct measurement: a predictive validity perspective. J Acad Mark Sci 40(3):434\u2013449. \nhttps:\/\/doi.org\/10.1007\/s11747-011-0300-3","journal-title":"J Acad Mark Sci"},{"issue":"2","key":"581_CR32","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.accinf.2007.10.003","volume":"9","author":"C Dowling","year":"2008","unstructured":"Dowling C (2008) Discussion of \u201cAn examination of contextual factors and individual characteristics affecting technology implementation decisions in auditing\u201d. Int J Account Inf Syst 9(2):122\u2013126. \nhttps:\/\/doi.org\/10.1016\/j.accinf.2007.10.003","journal-title":"Int J Account Inf Syst"},{"issue":"7","key":"581_CR33","first-page":"377","volume":"9","author":"GG Gable","year":"2008","unstructured":"Gable GG, Sedera D, Chan T (2008) Re-conceptualizing information system success: the IS-impact measurement model. J Assoc Inf Syst 9(7):377\u2013408","journal-title":"J Assoc Inf Syst"},{"key":"581_CR34","first-page":"1","volume":"2012","author":"J Gantz","year":"2012","unstructured":"Gantz J, Reinsel D (2012) The digital universe in 2020: big data, bigger digital shadows, and biggest growth in the far east. IDC IVIEW 2012:1\u201316","journal-title":"IDC IVIEW"},{"key":"581_CR35","unstructured":"Gehrke N, Wolf P (2010) Towards Audit 2.0\u2014a web 2.0 community platform for auditors. In: Proceedings of the 43rd Hawaii International Conference on System Sciences, pp 1\u201310"},{"key":"581_CR36","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1080\/01621459.1975.10479865","volume":"70","author":"S Geisse","year":"1974","unstructured":"Geisse S (1974) The predictive sample reuse method with applications. J Am Stat Assoc 70:320\u2013328","journal-title":"J Am Stat Assoc"},{"issue":"3","key":"581_CR37","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1007\/s11747-011-0261-6","volume":"40","author":"JF Hair","year":"2012","unstructured":"Hair JF, Sarstedt M, Ringle CM, Mena JA (2012) An assessment of the use of partial least squares structural equation modeling in marketing research. J Acad Mark Sci 40(3):414\u2013433. \nhttps:\/\/doi.org\/10.1007\/s11747-011-0261-6","journal-title":"J Acad Mark Sci"},{"issue":"2","key":"581_CR06","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1108\/EBR-10-2013-0128","volume":"26","author":"F Hair Jr","year":"2014","unstructured":"Hair F Jr, Sarstedt J, Hopkins L, Kuppelwieser GV (2014) Partial least squares structural equation modeling (PLS-SEM) An emerging tool in business research. Eur Bus Rev 26(2):106\u2013121","journal-title":"Eur Bus Rev"},{"key":"581_CR38","first-page":"10","volume":"5","author":"Haskins and Sells","year":"1968","unstructured":"Haskins and Sells (1968) Coming to grips with Auditape. HandS Rep 5:10\u201313","journal-title":"HandS Rep"},{"key":"581_CR39","first-page":"26","volume":"6","author":"Haskins and Sells","year":"1969","unstructured":"Haskins and Sells (1969) Auditape orientation. HandS Rep 6:26\u201329","journal-title":"HandS Rep"},{"issue":"3","key":"581_CR40","first-page":"55","volume":"6","author":"GJ Hofstede","year":"2001","unstructured":"Hofstede GJ (2001) Adoption of communication technologies and national culture. Syst Inf Manag 6(3):55\u201374","journal-title":"Syst Inf Manag"},{"issue":"4","key":"581_CR41","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1504\/IJSS.2008.020054","volume":"4","author":"SM Huang","year":"2008","unstructured":"Huang SM, Hung YC, Tsao HH (2008) Examining the determinants of computer-assisted audit techniques acceptance from internal auditors\u2019 viewpoints. Int J Serv Stand 4(4):377. \nhttps:\/\/doi.org\/10.1504\/IJSS.2008.020054","journal-title":"Int J Serv Stand"},{"key":"581_CR42","first-page":"1","volume":"200","author":"IAASB","year":"2007","unstructured":"IAASB (2007) Effective date for IAASB\u2019S clarified international standards on auditing. Int Fed Account 200:1\u20132","journal-title":"Int Fed Account"},{"key":"581_CR43","first-page":"1","volume":"1","author":"IAASB","year":"2008","unstructured":"IAASB (2008) IAASB clarity project update. Int Audit Assur Stand Board 1:1\u20137","journal-title":"Int Audit Assur Stand Board"},{"key":"581_CR44","volume-title":"Handbook of international quality control, auditing review, other assurance, and related services pronouncements","author":"IAASB","year":"2012","unstructured":"IAASB (2012) Handbook of international quality control, auditing review, other assurance, and related services pronouncements, vol 1. IFAC, New York"},{"key":"581_CR45","volume-title":"Glossary of terms","author":"IAASB","year":"2013","unstructured":"IAASB (2013) Glossary of terms, vol 1. IAASB, New York"},{"issue":"December","key":"581_CR46","doi-asserted-by":"crossref","first-page":"465","DOI":"10.2307\/249629","volume":"19","author":"CL Iacovou","year":"1995","unstructured":"Iacovou CL, Benbasat I, Dexter AS (1995) Electronic Data interchange and small businesses: adoption and impact of technology. MIS Q 19(December):465\u2013485","journal-title":"MIS Q"},{"key":"581_CR47","unstructured":"IFAC (2005) IFAC news\u20146\/24\/2005. \nhttp:\/\/www.lacpa.org.lb\/Includes\/Images\/Docs\/TC\/newsletter22\/IFAC.pdf\n\n. Accessed 10 Oct 2018"},{"key":"581_CR48","volume-title":"Guide to using international standards on auditing in the audits of small- and medium-sized entities, vol 2\u2014practical guidance","author":"IFAC","year":"2010","unstructured":"IFAC (2010) Guide to using international standards on auditing in the audits of small- and medium-sized entities, vol 2\u2014practical guidance. IFAC, New York"},{"key":"581_CR49","unstructured":"IFAC (2013) History IFAC. \nhttp:\/\/www.ifac.org\/about-ifac\/organization-overview\/history\n\n. Accessed 1 Dec 2013"},{"key":"581_CR50","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1016\/S0378-7206(97)00006-2","volume":"32","author":"M Igbaria","year":"1997","unstructured":"Igbaria M, Tan M (1997) The consequences of information technology acceptance on subsequent individual performance. Inf Manag 32:113\u2013121","journal-title":"Inf Manag"},{"issue":"2","key":"581_CR51","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1145\/1066149.1066152","volume":"36","author":"J Iivari","year":"2005","unstructured":"Iivari J (2005) An empirical test of the model of information system success. Data Base Adv Inf Syst 36(2):8\u201327","journal-title":"Data Base Adv Inf Syst"},{"key":"581_CR52","volume-title":"G3\u2014user of computer assisted audit techniques (CAATs)","author":"ISACA","year":"2008","unstructured":"ISACA (2008) G3\u2014user of computer assisted audit techniques (CAATs). ISACA, Washington"},{"key":"581_CR53","unstructured":"Janvrin D, Lowe DJ, Bierstaker J (2008) Auditor acceptance of computer-assisted audit techniques (Working Paper)"},{"issue":"1","key":"581_CR54","first-page":"97","volume":"23","author":"D Janvrin","year":"2009","unstructured":"Janvrin D, Bierstaker J, Lowe DJ (2009) An investigation of factors influencing the use of computer-related audit procedures. J Inf Syst 23(1):97\u2013118","journal-title":"J Inf Syst"},{"key":"581_CR55","volume-title":"An audit approach to computers: a new practice manual","author":"B Jenkins","year":"1978","unstructured":"Jenkins B, Pinkney A (1978) An audit approach to computers: a new practice manual. Institute of Chartered Accountants in England and Wales, London"},{"issue":"4","key":"581_CR01","first-page":"377","volume":"6","author":"AB Katamba","year":"2017","unstructured":"Katamba AB, Voon AYS, Min HS, Seow HV (2017) Information systems utilisation by external auditors in Tanzania. Rev Integr Bus Econ Res 6(4):377","journal-title":"Rev Integr Bus Econ Res"},{"key":"581_CR56","unstructured":"Kim H, Mannino M (2012) Effect of software feature training on beliefs, use, and performance: using the benford\u2019s law feature of generalized audit software. In: AMCIS 2012 Proceedings, July 29, 2012. Paper 22. \nhttp:\/\/aisel.aisnet.org\/amcis2012\/proceedings\/AdoptionDiffusionIT\/22\n\n. Accessed 10 Oct 2018"},{"issue":"4","key":"581_CR57","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1016\/j.accinf.2009.09.001","volume":"10","author":"H-J Kim","year":"2009","unstructured":"Kim H-J, Mannino M, Nieschwietz RJ (2009) Information technology acceptance in the internal audit profession: impact of technology features and complexity. Int J Account Inf Syst 10(4):214\u2013228","journal-title":"Int J Account Inf Syst"},{"key":"581_CR58","volume-title":"The CISA prep guide: mastering the certified information systems auditor exam","author":"J Kramer","year":"2003","unstructured":"Kramer J (2003) The CISA prep guide: mastering the certified information systems auditor exam. Wiley, Indianapolis"},{"issue":"2","key":"581_CR59","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1257\/jel.46.2.285","volume":"46","author":"R LaPorta","year":"2008","unstructured":"LaPorta R, Lopez-de-Silanes F, Shleifer A (2008) The economic consequences of legal origins. J Econ Lit 46(2):285\u2013332","journal-title":"J Econ Lit"},{"key":"581_CR60","doi-asserted-by":"crossref","unstructured":"Debreceny RS, Lee S-L, NEO W, Shuling JT (2005) Employing generalized audit software in the financial services sector: challenges and opportunities (Working Paper). Honolulu, USA","DOI":"10.1108\/02686900510606092"},{"key":"581_CR61","doi-asserted-by":"crossref","first-page":"890","DOI":"10.1109\/TCC.2016.2522411","volume":"6","author":"S Lins","year":"2016","unstructured":"Lins S, Schneider S, Sunyaev A (2016) Trust is good, control is better: creating secure clouds by continuous auditing. IEEE Trans Cloud Comput 6:890\u2013903","journal-title":"IEEE Trans Cloud Comput"},{"issue":"1","key":"581_CR62","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2308\/acch.2008.22.1.1","volume":"22","author":"D LonJanvrin","year":"2008","unstructured":"LonJanvrin D, Bierstaker J, Lowe DJ (2008) An examination of audit information technology use and perceived importance. Account Horizons 22(1):1\u201321","journal-title":"Account Horizons"},{"issue":"1","key":"581_CR63","first-page":"72","volume":"8","author":"LM Lovata","year":"1988","unstructured":"Lovata LM (1988) The utilization of generalized audit software. Audit J Pract Theory 8(1):72\u201386","journal-title":"Audit J Pract Theory"},{"key":"581_CR64","volume-title":"The Profession of EDP audit in Hong Kong","author":"C Ma","year":"1989","unstructured":"Ma C (1989) The Profession of EDP audit in Hong Kong. University of Hong Kong, Hong Kong"},{"issue":"4","key":"581_CR65","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1108\/MAJ-05-2013-0877","volume":"29","author":"N Mahzan","year":"2014","unstructured":"Mahzan N, Lymer A (2014) Examining the adoption of computer-assisted audit tools and techniques: cases of generalized audit software use by internal auditors. Manag Audit J 29(4):327\u2013349","journal-title":"Manag Audit J"},{"issue":"1","key":"581_CR66","doi-asserted-by":"crossref","first-page":"248","DOI":"10.5296\/ber.v6i1.8996","volume":"6","author":"EM Mansour","year":"2016","unstructured":"Mansour EM (2016) Factors affecting the adoption of computer assisted audit techniques in audit process: findings from Jordan. Bus Econ Res 6(1):248\u2013271","journal-title":"Bus Econ Res"},{"issue":"9","key":"581_CR67","doi-asserted-by":"publisher","first-page":"3523","DOI":"10.5897\/AJBM10.1047","volume":"5","author":"MK Moorthy","year":"2011","unstructured":"Moorthy MK, Mohamed ASZ, Gopalan M, San LH (2011) The impact of information technology on internal auditing. Afr J Bus Manag 5(9):3523\u20133539. \nhttps:\/\/doi.org\/10.5897\/AJBM10.1047","journal-title":"Afr J Bus Manag"},{"issue":"13","key":"581_CR68","first-page":"58","volume":"500","author":"AJ Neumann","year":"1977","unstructured":"Neumann AJ (1977) Features of seven audit software packages\u2014principles and capabilities. Natl Bureau Stand Spec Publ 500(13):58","journal-title":"Natl Bureau Stand Spec Publ"},{"key":"581_CR07","unstructured":"Pedrosa I, Costa CJ (2014) Statutory auditors\u2019 profile and computer assisted audit tools and techniques\u2019 acceptance: indicators on firms and peers\u2019 influence. In: ISDOC\u201914 proceedings of the international conference on information systems and design of communication, May 16\u201317, 2014, Lisbon, Portugal, pp 20\u201326"},{"key":"581_CR69","volume-title":"An audit approach to computers","author":"A Pinkney","year":"1966","unstructured":"Pinkney A (1966) An audit approach to computers. Institute of Chartered Accountants in England and Wales, London"},{"issue":"12","key":"581_CR70","first-page":"615","volume":"11","author":"M Ramen","year":"2015","unstructured":"Ramen M, Jugurnath B, Ramhit P (2015) UTR-CTOE: a new paradigm explaining CAATs adoption. J Mod Account Audit 11(12):615\u2013631","journal-title":"J Mod Account Audit"},{"issue":"1","key":"581_CR71","doi-asserted-by":"crossref","first-page":"3","DOI":"10.2307\/41410402","volume":"36","author":"CM Ringle","year":"2012","unstructured":"Ringle CM, Sarstedt M, Straub D (2012) A critical look at the use of PLS-SEM in MIS Quarterly. MIS Q 36(1):3\u201314","journal-title":"MIS Q"},{"key":"581_CR72","unstructured":"Rosli K, Yeow PHP, Siew E-G (2012) Computer-assisted auditing tools acceptance using I-Toe: a new paradigm. In: PACIS 2012 Proceedings. Paper 195"},{"key":"581_CR73","unstructured":"Rosli K, Yeow PHP, Siew E-G (2013) Adoption of audit technology in audit firms. In Deng H, Standing C (eds) Proceedings of the 24th Australasian Conference on Information Systems, Melbourne, Australia, 4\u20136 December, pp 1\u201312"},{"issue":"2","key":"581_CR74","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/j.accinf.2007.10.004","volume":"9","author":"R Rowe","year":"2008","unstructured":"Rowe R (2008) Discussion of \u201cAn examination of contextual factors and individual characteristics affecting technology implementation decisions in auditing\u201d. Int J Account Inf Syst 9(2):127\u2013129. \nhttps:\/\/doi.org\/10.1016\/j.accinf.2007.10.004","journal-title":"Int J Account Inf Syst"},{"key":"581_CR75","first-page":"1","volume":"1","author":"SA Sayana","year":"2003","unstructured":"Sayana SA (2003) Using CAATs to support IS audit. Inf Syst Control J 1:1\u20133","journal-title":"Inf Syst Control J"},{"key":"581_CR76","unstructured":"Sedera D, Gable G, Chan T (2004) Measuring enterprise systems success: the importance of a multiple stakeholder perspective. In: 12th European conference on information systems, pp 1\u201313. \nhttp:\/\/eprints.qut.edu.au\/4732\/\n\n. Accessed 10 Oct 2018"},{"issue":"4","key":"581_CR77","doi-asserted-by":"crossref","first-page":"517","DOI":"10.2307\/249590","volume":"17","author":"AH Segars","year":"1993","unstructured":"Segars AH, Grover V (1993) Re-examining perceived ease of use and usefulness: a confirmatory factor analysis. MIS Q 17(4):517\u2013525","journal-title":"MIS Q"},{"issue":"2","key":"581_CR05","doi-asserted-by":"publisher","first-page":"111","DOI":"10.2307\/2984809","volume":"36","author":"M Stone","year":"1974","unstructured":"Stone M (1974) Cross-validatory choice and assessment of statistical predictions. J R Stat Soc Ser B (Methodol) 36(2):111\u2013147. \nhttps:\/\/doi.org\/10.2307\/2984809","journal-title":"J R Stat Soc Ser B (Methodol)"},{"issue":"1","key":"581_CR78","first-page":"10","volume":"6","author":"N Tangke","year":"2004","unstructured":"Tangke N (2004) Analisa Penerimaan Penerapan Teknik Audit Berbantuan Komputer (TABK) dengan Menggunakan Technology Acceptance Model (TAM) pada Badan Pemeriksa Keuangan (BPK) RI. Jurnal Akuntansi \\Keuangan 6(1):10\u201328","journal-title":"Jurnal Akuntansi \\Keuangan"},{"issue":"4","key":"581_CR79","doi-asserted-by":"crossref","first-page":"561","DOI":"10.2307\/249633","volume":"19","author":"S Taylor","year":"1995","unstructured":"Taylor S, Todd P (1995a) Assessing IT usage: the role of prior experience. MIS Q 19(4):561\u2013570","journal-title":"MIS Q"},{"key":"581_CR80","doi-asserted-by":"publisher","DOI":"10.1287\/isre.6.2.144","author":"S Taylor","year":"1995","unstructured":"Taylor S, Todd P (1995b) Understanding information technology usage: a test of competing models. Inf Syst Res. \nhttps:\/\/doi.org\/10.1287\/isre.6.2.144","journal-title":"Inf Syst Res"},{"key":"581_CR81","unstructured":"Temesgen ZB (2005) Determinants for Effective Application of Software in Computer Assisted Auditing Techniques (CAATs). Ronneby \u2013 Sweden"},{"issue":"1","key":"581_CR82","first-page":"7","volume":"1","author":"OM Tijani","year":"2014","unstructured":"Tijani OM (2014) Built-in functions and features of data analysis software: predictors of optimal deployment for continuous audit assurance. Sch J Econ Bus Manag 1(1):7\u201318","journal-title":"Sch J Econ Bus Manag"},{"issue":"3","key":"581_CR83","first-page":"1","volume":"1","author":"A Tumi","year":"2013","unstructured":"Tumi A (2013) An investigative study into the perceived factors precluding auditors from using CAATs and CA. Int J Adv Res Bus 1(3):1\u201345","journal-title":"Int J Adv Res Bus"},{"issue":"2","key":"581_CR84","first-page":"5","volume":"11","author":"N Urbach","year":"2010","unstructured":"Urbach N, Ahlemann F (2010) Structural equation modeling in information systems research using partial least squares. J Inf Technol Theory Appl 11(2):5\u201340","journal-title":"J Inf Technol Theory Appl"},{"key":"581_CR85","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-1-4419-6108-2","volume-title":"Information systems theory: explaining and predicting our digital society","author":"N Urbach","year":"2012","unstructured":"Urbach N, M\u00fcller B (2012) The updated DeLone and McLean model of information systems success. In: Dwivedi YK, Wade MR, Schneberger SL (eds) Information systems theory: explaining and predicting our digital society, vol 1. Springer, New York, pp 1\u201314. \nhttps:\/\/doi.org\/10.1007\/978-1-4419-6108-2"},{"issue":"3","key":"581_CR86","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1016\/j.jsis.2010.06.002","volume":"19","author":"N Urbach","year":"2010","unstructured":"Urbach N, Smolnik S, Riempp G (2010a) An empirical investigation of employee portal success. J Strateg Inf Syst 19(3):184\u2013206. \nhttps:\/\/doi.org\/10.1016\/j.jsis.2010.06.002","journal-title":"J Strateg Inf Syst"},{"key":"581_CR87","unstructured":"Urbach N, Smolnik S, Riempp G (2010b) Industry-specificity of employee portal success: a multi-group comparison. In: Proceedings of the Sixteenth Americas Conference on Information Systems, Lima, Peru, August 12\u201315, 2010, pp 1\u201311"},{"issue":"1","key":"581_CR88","first-page":"490","volume":"1","author":"C Vasile-daniel","year":"2009","unstructured":"Vasile-daniel C (2009) How Financial Auditors Use CAATs and Perceive ERP Systems? Ann Fac Econ 1(1):490\u2013495","journal-title":"Ann Fac Econ"},{"key":"581_CR89","first-page":"545","volume":"20","author":"C Vasile-daniel","year":"2011","unstructured":"Vasile-daniel C (2011) How Romanian financial and internal auditors acquire accounting information systems knowledge and competences? Ann Univ Oradea Econ Sci Ser 20:545\u2013552","journal-title":"Ann Univ Oradea Econ Sci Ser"},{"issue":"4","key":"581_CR90","doi-asserted-by":"crossref","first-page":"342","DOI":"10.1287\/isre.11.4.342.11872","volume":"11","author":"V Venkatesh","year":"2000","unstructured":"Venkatesh V (2000) Determinants of perceived ease of use\u2014integrating control, intrinsic motivation, and emotion into the technology acceptance model. Inf Syst Res 11(4):342\u2013365","journal-title":"Inf Syst Res"},{"issue":"3","key":"581_CR91","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1287\/mnsc.l050.0442","volume":"52","author":"V Venkatesh","year":"2006","unstructured":"Venkatesh V, Agarwal R (2006) Turning visitors into customers: a usability-centric perspective on purchase behavior in electronic channels. Manage Sci 52(3):367\u2013382. \nhttps:\/\/doi.org\/10.1287\/mnsc.l050.0442","journal-title":"Manage Sci"},{"issue":"2","key":"581_CR92","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1111\/j.1540-5915.2008.00192.x","volume":"39","author":"V Venkatesh","year":"2008","unstructured":"Venkatesh V, Bala H (2008) Technology acceptance model 3 and a research agenda on interventions. Decis Sci 39(2):273\u2013315. \nhttps:\/\/doi.org\/10.1111\/j.1540-5915.2008.00192.x","journal-title":"Decis Sci"},{"issue":"3","key":"581_CR93","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1111\/j.1540-5915.1996.tb01822.x","volume":"27","author":"V Venkatesh","year":"1996","unstructured":"Venkatesh V, Davis FD (1996) A model of the antecedents of perceived ease of use: development and test. Decis Sci 27(3):451\u2013481","journal-title":"Decis Sci"},{"issue":"2","key":"581_CR94","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1287\/mnsc.46.2.186.11926","volume":"46","author":"V Venkatesh","year":"2000","unstructured":"Venkatesh V, Davis FD (2000) A theoretical extension of the technology acceptance model: four longitudinal field studies. Manage Sci 46(2):186\u2013204. \nhttps:\/\/doi.org\/10.1287\/mnsc.46.2.186.11926","journal-title":"Manage Sci"},{"issue":"1","key":"581_CR95","doi-asserted-by":"crossref","first-page":"115","DOI":"10.2307\/3250981","volume":"24","author":"V Venkatesh","year":"2000","unstructured":"Venkatesh V, Morris MG (2000) Why don\u2019t men ever stop to ask for directions? Gender, social influence, and their role in technology acceptance and usage behaviour. MIS Q 24(1):115\u2013139","journal-title":"MIS Q"},{"issue":"1","key":"581_CR96","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1006\/obhd.1999.2837","volume":"79","author":"V Venkatesh","year":"1999","unstructured":"Venkatesh V, Speier C (1999) Computer technology training in the workplace: a longitudinal investigation of the effect of mood. Organ Behav Hum Decis Process 79(1):1\u201328","journal-title":"Organ Behav Hum Decis Process"},{"issue":"3","key":"581_CR97","doi-asserted-by":"crossref","first-page":"425","DOI":"10.2307\/30036540","volume":"27","author":"V Venkatesh","year":"2003","unstructured":"Venkatesh V, Morris MG, Davis GB, Davis FD (2003) User acceptance of information technology: toward a unified view. MIS Q 27(3):425\u2013478","journal-title":"MIS Q"},{"issue":"3","key":"581_CR98","doi-asserted-by":"crossref","first-page":"483","DOI":"10.2307\/25148853","volume":"32","author":"V Venkatesh","year":"2008","unstructured":"Venkatesh V, Brown SA, Bala H (2008) Predicting different conceptualizations of system use: the competing roles of behavioral intention, facilitating conditions, and behavioral expectation. MIS Q 32(3):483\u2013502","journal-title":"MIS Q"},{"issue":"1","key":"581_CR99","doi-asserted-by":"crossref","first-page":"157","DOI":"10.2307\/41410412","volume":"36","author":"V Venkatesh","year":"2012","unstructured":"Venkatesh V, Thong JYL, Xu X (2012) Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology. MIS Q 36(1):157\u2013178","journal-title":"MIS Q"},{"issue":"1","key":"581_CR02","first-page":"95","volume":"18","author":"ML Weidenmier","year":"2004","unstructured":"Weidenmier ML, Herron TL (2004) Selecting an audit package for classroom use. J Inf Syst 18(1):95\u2013110","journal-title":"J Inf Syst"},{"issue":"4","key":"581_CR100","doi-asserted-by":"crossref","first-page":"544","DOI":"10.1108\/02686900410530547","volume":"19","author":"DC Yang","year":"2004","unstructured":"Yang DC, Guan L (2004) The evolution of IT auditing and internal control standards in financial statement audits: the case of the United States. Manag Audit J 19(4):544\u2013555","journal-title":"Manag Audit J"},{"key":"581_CR101","volume-title":"Structured query language: an alternative audit tool to support good governance","author":"OY Yuliana","year":"2006","unstructured":"Yuliana OY, Tangke N (2006) Structured query language: an alternative audit tool to support good governance. Petra Christian University, Surabaya"},{"issue":"02","key":"581_CR102","first-page":"135","volume":"6","author":"SSB Zainol","year":"2017","unstructured":"Zainol SSB, Samsuri ASB, Arifin TRBT, Hussin SB, Othman MSB, Jie SJ (2017) Determinants of computer assisted audit techniques (Caats) adoption. A study in small and medium practices in Malaysia. Eur J Bus Soc Sci 6(02):135\u2013150","journal-title":"Eur J Bus Soc Sci"},{"key":"581_CR103","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1057\/palgrave.ejis.3000475","volume":"12","author":"K Zhu","year":"2003","unstructured":"Zhu K, Kraemer K, Xu S (2003) Electronic business adoption by European firms: a cross-country assessment of the facilitators and inhibitors. Eur J Inf Syst 12:251\u2013268. \nhttps:\/\/doi.org\/10.1057\/palgrave.ejis.3000475","journal-title":"Eur J Inf Syst"}],"container-title":["Cognition, Technology &amp; Work"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10111-019-00581-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10111-019-00581-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10111-019-00581-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,30]],"date-time":"2020-07-30T08:18:45Z","timestamp":1596097125000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10111-019-00581-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,9]]},"references-count":109,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,8]]}},"alternative-id":["581"],"URL":"https:\/\/doi.org\/10.1007\/s10111-019-00581-4","relation":{},"ISSN":["1435-5558","1435-5566"],"issn-type":[{"value":"1435-5558","type":"print"},{"value":"1435-5566","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,7,9]]},"assertion":[{"value":"10 December 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 June 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 July 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}