{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:25:56Z","timestamp":1729650356174,"version":"3.28.0"},"reference-count":39,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1109\/cisti.2015.7170623","type":"proceedings-article","created":{"date-parts":[[2015,7,30]],"date-time":"2015-07-30T17:21:22Z","timestamp":1438276882000},"page":"1-6","source":"Crossref","is-referenced-by-count":6,"title":["Motivations and limitations on the use of information technology on statutory auditors' work: An exploratory study"],"prefix":"10.1109","author":[{"given":"Isabel","family":"Pedrosa","sequence":"first","affiliation":[]},{"given":"Carlos J.","family":"Costa","sequence":"additional","affiliation":[]},{"given":"Raul M. S.","family":"Laureano","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"A utiliza&#x00E7;&#x00E3;o de t&#x00E9;cnicas de auditoria assistidas por computador na revis&#x00E3;o legal das contas &#x2014; implementa&#x00E7;&#x00E3;o do software de an&#x00E1;lise e interpreta&#x00E7;&#x00E3;o de dados IDEA","author":"sim\u00f5es","year":"2012","journal-title":"ISCA"},{"key":"ref38","first-page":"199","article-title":"Key concepts: Underlying structures of culture","author":"hall","year":"2003","journal-title":"Readings and Cases in International Management A Cross-Cultural Perspective"},{"key":"ref33","first-page":"21","article-title":"The benefit of introducing audit software into curricula for computer auditing students: a student perspective from the University of Pretoria","volume":"17","author":"coetzee","year":"2003","journal-title":"SAJHE\/SATHO"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.5539\/ibr.v6n4p147"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.46.2.186.11926"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.1992.tb00945.x"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"425","DOI":"10.2307\/30036540","article-title":"User acceptance of information technology: Toward a unified view","volume":"27","author":"venkatesh","year":"2003","journal-title":"MIS Q"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"241","DOI":"10.2308\/iace.2003.18.3.241","article-title":"Challenges to Audit Education for the 21 st Century: A Survey of Curricula, Course, Content, and DElivery Methods","volume":"18","author":"johnson","year":"2003","journal-title":"Issues Account Educ"},{"key":"ref35","first-page":"28","article-title":"Faculty Perspective of a Contemporary Auditing Curriculum","volume":"20","author":"blouch","year":"2009","journal-title":"J Business Behav Sci"},{"key":"ref34","first-page":"9","article-title":"A Curriculum for Teaching Information Technology Investigative Techniques for Auditors","volume":"1","author":"kearns","year":"2006","journal-title":"Journal of Digital Forensics Security and Law"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.accinf.2009.09.001"},{"key":"ref11","first-page":"1","article-title":"Adoption of Audit Technology in Audit Firms","author":"rosli","year":"2013","journal-title":"Proc of the 24th Australasian Conf on Information Systems"},{"article-title":"Adoption of Generalised Audit Software (GAS) by External Auditors in the UK","year":"2012","author":"ahmi","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.2308\/acch.2008.22.1.1"},{"key":"ref14","first-page":"19","article-title":"Mainstreaming CAATs","volume":"55","author":"paukowits","year":"1998","journal-title":"Intern Audit"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.2308\/jis.2009.23.1.79"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/S0748-5751(02)00011-8"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1108\/MAJ-05-2013-0877"},{"key":"ref18","first-page":"656","volume":"5","author":"saunders","year":"2009","journal-title":"Research methods for business students"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.2308\/jis.2009.23.1.97"},{"article-title":"Adoption of Computer Assisted Audit Tools and Techniques (CAATTs) by Internal Auditors: Current issues in the UK","year":"2008","author":"mahzan","key":"ref28"},{"journal-title":"AICPA","article-title":"Computer-Assisted Audit Techniques","year":"1979","key":"ref4"},{"key":"ref27","doi-asserted-by":"crossref","DOI":"10.1108\/02686900510606092","article-title":"EMPLOYING GENERALIZED AUDIT SOFTWARE IN THE FINANCIAL SERVICES SECTOR: Challenges and Opportunities","author":"debreceny","year":"2005"},{"key":"ref3","first-page":"1","article-title":"Using CAATs to Support IS Audit","volume":"1","author":"sayana","year":"2003","journal-title":"Inf Syst Control J"},{"journal-title":"IAAS","article-title":"GLOSSARY OF TERMS","year":"2013","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.2307\/249008"},{"journal-title":"IIA","article-title":"International Standards for the Professional Practice of Internal Auditing (Standards)","year":"2012","key":"ref5"},{"key":"ref8","first-page":"1","article-title":"Evolution of Auditing: From the Traditional Approach to the Future Audit - White Paper","author":"byrnes","year":"2012","journal-title":"AICPA"},{"journal-title":"ISACA","article-title":"CISA &#x00AE; Glossary","year":"2012","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1108\/02686900310500488"},{"key":"ref9","first-page":"813","article-title":"A Survey of Techniques for Auditing EDP-Based Accounting Information Systems","volume":"ii","author":"cash","year":"1977","journal-title":"Account Rev"},{"journal-title":"ISACA","article-title":"G3 - USE OF COMPUTER-ASSISTED AUDIT TECHNIQUES (CAATs)","year":"2008","key":"ref1"},{"key":"ref20","first-page":"64","article-title":"What factors influence auditors' use of computer-assisted audit techniques?","volume":"30","author":"bierstaker","year":"2013","journal-title":"Adv Account"},{"article-title":"Artificial Neural Networks in Auditing: State of the Art","year":"2003","author":"koskivaara","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1080\/09638180500510475"},{"journal-title":"AICPA","article-title":"AICPA - CPA CPE Requirements: Continuing Professional Education","year":"2011","key":"ref24"},{"key":"ref23","first-page":"7","article-title":"Built-In Functions and Features of Data Analysis Software: Predictors of Optimal Deployment for Continuous Audit Assurance","volume":"1","author":"tijani","year":"2014","journal-title":"Sch J Econ Bus Manag"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2311917.2311925"},{"article-title":"Auditor Acceptance of Computer-Assisted Audit Techniques (Working Paper)","year":"2008","author":"janvrin","key":"ref25"}],"event":{"name":"2015 10th Iberian Conference on Information Systems and Technologies (CISTI)","start":{"date-parts":[[2015,6,17]]},"location":"Aveiro, Portugal","end":{"date-parts":[[2015,6,20]]}},"container-title":["2015 10th Iberian Conference on Information Systems and Technologies (CISTI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7152443\/7170350\/07170623.pdf?arnumber=7170623","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,28]],"date-time":"2019-08-28T18:47:43Z","timestamp":1567018063000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7170623\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/cisti.2015.7170623","relation":{},"subject":[],"published":{"date-parts":[[2015,6]]}}}