{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T13:37:48Z","timestamp":1778593068042,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,5,16]],"date-time":"2014-05-16T00:00:00Z","timestamp":1400198400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,5,16]]},"DOI":"10.1145\/2618168.2618190","type":"proceedings-article","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T12:50:25Z","timestamp":1402404625000},"page":"138-142","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["New trends on CAATTs"],"prefix":"10.1145","author":[{"given":"Isabel","family":"Pedrosa","sequence":"first","affiliation":[{"name":"Instituto Polit\u00e9cnico de Coimbra, Quinta Agr\u00edcola, Bencanta - Coimbra"}]},{"given":"Carlos J.","family":"Costa","sequence":"additional","affiliation":[{"name":"Instituto Universit\u00e1rio de Lisboa (ISCTE), Lisboa"}]}],"member":"320","published-online":{"date-parts":[[2014,5,16]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1","volume-title":"Auditor Acceptance of Computer-Assisted Audit Techniques","author":"Janvrin D.","year":"2008","unstructured":"D. Janvrin , D. J. Lowe , and J. Bierstaker , \" Auditor Acceptance of Computer-Assisted Audit Techniques .\" pp. 1 -- 26 , 2008 . D. Janvrin, D. J. Lowe, and J. Bierstaker, \"Auditor Acceptance of Computer-Assisted Audit Techniques.\" pp. 1--26, 2008."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2311917.2311925"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"A. Ahmi \"Adoption of Generalised Audit Software (GAS) by External Auditors in the UK \" Brunel University - London 2012.  A. Ahmi \"Adoption of Generalised Audit Software (GAS) by External Auditors in the UK \" Brunel University - London 2012.","DOI":"10.1108\/02686901311284522"},{"key":"e_1_3_2_1_4_1","volume-title":"What factors influence auditors' use of computer-assisted audit techniques?,\" Adv. Account","author":"Bierstaker J.","year":"2013","unstructured":"J. Bierstaker , D. Janvrin , and D. J. Lowe , \" What factors influence auditors' use of computer-assisted audit techniques?,\" Adv. Account ., vol. na, no. na, pp. 8-- 15 , Dec. 2013 . J. Bierstaker, D. Janvrin, and D. J. Lowe, \"What factors influence auditors' use of computer-assisted audit techniques?,\" Adv. Account., vol. na, no. na, pp. 8--15, Dec. 2013."},{"issue":"1","key":"e_1_3_2_1_5_1","first-page":"199","article-title":"The AICPA Assurance Services Executive Committee Emerging Assurance Technologies Task Force: The Audit Data Standards (ADS) Initiative","volume":"26","author":"Zhang Li","year":"2012","unstructured":"Li Zhang , A. R. Pawlicki , D. McQuilken , and W. R. Titera , \" The AICPA Assurance Services Executive Committee Emerging Assurance Technologies Task Force: The Audit Data Standards (ADS) Initiative ,\" J. Inf. Syst. , vol. 26 , no. 1 , pp. 199 -- 205 , 2012 . Li Zhang, A. R. Pawlicki, D. McQuilken, and W. R. Titera, \"The AICPA Assurance Services Executive Committee Emerging Assurance Technologies Task Force: The Audit Data Standards (ADS) Initiative,\" J. Inf. Syst., vol. 26, no. 1, pp. 199--205, 2012.","journal-title":"J. Inf. Syst."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.2308\/iace.2010.25.3.405"},{"key":"e_1_3_2_1_7_1","unstructured":"ISACA \"COBIT 5 - A Business Framework for the Governance and Management of Enterprise IT \" ISACA website 2012.   ISACA \"COBIT 5 - A Business Framework for the Governance and Management of Enterprise IT \" ISACA website 2012."},{"key":"e_1_3_2_1_8_1","volume-title":"2012 IT Risk\/Reward Barometer: Europe","author":"Kessinger K.","year":"2012","unstructured":"K. Kessinger and N. Stinchcombe , \" 2012 IT Risk\/Reward Barometer: Europe ,\" 2012 . K. Kessinger and N. Stinchcombe, \"2012 IT Risk\/Reward Barometer: Europe,\" 2012."},{"key":"e_1_3_2_1_9_1","unstructured":"European Comission Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation) vol. 0011. 2012 pp. 1--119.  European Comission Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation) vol. 0011. 2012 pp. 1--119."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1108\/02686900310500488"},{"key":"e_1_3_2_1_11_1","unstructured":"S. A. Sayana \"Using CAATs to Support IS Audit \" 2003.  S. A. Sayana \"Using CAATs to Support IS Audit \" 2003."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.accinf.2009.09.001"},{"key":"e_1_3_2_1_13_1","unstructured":"AICPA \"North American Accounting Professionals See  Data Oversight as Top Priority for Technology \" AICPA 2013. {Online}. Available: http:\/\/www.aicpa.org\/Press\/PressReleases\/2013\/Pages\/North-America. {Accessed: 13-Mar-2014}.  AICPA \"North American Accounting Professionals See Data Oversight as Top Priority for Technology \" AICPA 2013. {Online}. Available: http:\/\/www.aicpa.org\/Press\/PressReleases\/2013\/Pages\/North-America. {Accessed: 13-Mar-2014}."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.accinf.2010.08.001"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.2308\/isys-10167"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2008.11.013"},{"key":"e_1_3_2_1_17_1","unstructured":"C. C. Albrecht \"Fraud and Forensic Accounting In a Digital Environment - White Paper for The Institute for Fraud Prevention.\" pp. 1--32 2008.  C. C. Albrecht \"Fraud and Forensic Accounting In a Digital Environment - White Paper for The Institute for Fraud Prevention.\" pp. 1--32 2008."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2012.09.021"},{"issue":"1","key":"e_1_3_2_1_19_1","first-page":"1","article-title":"AIS in a More Rapidly Evolving Era - Editorial","volume":"26","author":"Vasarhelyi M. A.","year":"2012","unstructured":"M. A. Vasarhelyi , \" AIS in a More Rapidly Evolving Era - Editorial ,\" J. Inf. Syst. , vol. 26 , no. 1 , pp. 1 -- 5 , Mar. 2012 . M. A. Vasarhelyi, \"AIS in a More Rapidly Evolving Era - Editorial,\" J. Inf. Syst., vol. 26, no. 1, pp. 1--5, Mar. 2012.","journal-title":"J. Inf. Syst."},{"key":"e_1_3_2_1_20_1","first-page":"1","article-title":"What Every IT Auditor Should Know About Transforming Data for CAATs","volume":"5","author":"Singleton T. W.","year":"2013","unstructured":"T. W. Singleton , \" What Every IT Auditor Should Know About Transforming Data for CAATs ,\" ISACA J. , vol. 5 , pp. 1 -- 2 , 2013 . T. W. Singleton, \"What Every IT Auditor Should Know About Transforming Data for CAATs,\" ISACA J., vol. 5, pp. 1--2, 2013.","journal-title":"ISACA J."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016551309288"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85836-2_8"},{"key":"e_1_3_2_1_23_1","volume-title":"controls and assurance in the cloud","author":"Control ISACA","year":"2011","unstructured":"ISACA , \"IT Control Objectives for Cloud Computing : controls and assurance in the cloud ,\" 2011 . ISACA, \"IT Control Objectives for Cloud Computing: controls and assurance in the cloud,\" 2011."},{"key":"e_1_3_2_1_24_1","unstructured":"AICPA \"2012 Top Technology Initiatives Survey Results \" 2012.  AICPA \"2012 Top Technology Initiatives Survey Results \" 2012."},{"key":"e_1_3_2_1_25_1","unstructured":"Business Wire \"ISACA Issues COBIT 5 Governance Framework Business Wire \" Business Wire Website 2012.  Business Wire \"ISACA Issues COBIT 5 Governance Framework Business Wire \" Business Wire Website 2012."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"J. Tannahill \"BYOD Risk Management - MOBILE TECHNOLOGY SECURITY& AUDIT BYOD.\" pp. 1--12 2013.  J. Tannahill \"BYOD Risk Management - MOBILE TECHNOLOGY SECURITY& AUDIT BYOD.\" pp. 1--12 2013.","DOI":"10.1016\/S1353-4858(13)70050-3"},{"key":"e_1_3_2_1_27_1","unstructured":"ENISA \"Smartphone Security --- ENISA \" Smartphone Security 2014. {Online}. Available: http:\/\/www.enisa.europa.eu\/activities\/Resilience-and-CIIP\/critical-applications\/smartphone-security-1\/smartphone-security.  ENISA \"Smartphone Security --- ENISA \" Smartphone Security 2014. {Online}. Available: http:\/\/www.enisa.europa.eu\/activities\/Resilience-and-CIIP\/critical-applications\/smartphone-security-1\/smartphone-security."},{"key":"e_1_3_2_1_28_1","volume-title":"Smartphones: Information security risks, opportunities and recommendation for users","author":"Hogben G.","year":"2010","unstructured":"G. Hogben and M. Dekker , \" Smartphones: Information security risks, opportunities and recommendation for users ,\" 2010 . G. Hogben and M. Dekker, \"Smartphones: Information security risks, opportunities and recommendation for users,\" 2010."}],"event":{"name":"ISDOC 2014: ISDOC 2014 - International Conference on Information Systems and Design of Communication","location":"Lisbon Portugal","acronym":"ISDOC 2014","sponsor":["ADETTI-IUL Advanced IS&IT Research Center","EuroSIGDOC ACM SIGDOC European chapter"]},"container-title":["Proceedings of the International Conference on Information Systems and Design of Communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2618168.2618190","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2618168.2618190","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:56:06Z","timestamp":1750229766000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2618168.2618190"}},"subtitle":["what are the chartered accountants' new challenges?"],"short-title":[],"issued":{"date-parts":[[2014,5,16]]},"references-count":28,"alternative-id":["10.1145\/2618168.2618190","10.1145\/2618168"],"URL":"https:\/\/doi.org\/10.1145\/2618168.2618190","relation":{},"subject":[],"published":{"date-parts":[[2014,5,16]]},"assertion":[{"value":"2014-05-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}