{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T08:07:47Z","timestamp":1773734867394,"version":"3.50.1"},"reference-count":74,"publisher":"American Accounting Association","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,3,1]]},"abstract":"<jats:title>ABSTRACT<\/jats:title>\n               <jats:p>Major news stories demonstrate the importance and vulnerability of information technology (IT), highlighting the need to understand how to reduce risk. This study investigates the key factors affecting IT audit quality (ITAQ), focusing on individual auditor and organizational factors. We utilize multiple approaches to understand professionals' general perceptions of ITAQ and results from specific audits. Our results suggest that the importance of IT audit quality factors differs between participants' general perceptions and those reported for specific IT audit experiences. Participants' general perceptions indicated that the most important factors for ITAQ were auditors' knowledge and skills, specifically IT and business process knowledge. By comparison, actual audit experiences suggest organizational factors as more important, specifically audit planning and the auditor-client relationship. We believe these differences between general perceptions and reported results suggest a potential opportunity to improve ITAQ via additional education and upfront development of the audit teams and processes.<\/jats:p>","DOI":"10.2308\/isys-18-043","type":"journal-article","created":{"date-parts":[[2020,2,18]],"date-time":"2020-02-18T14:49:45Z","timestamp":1582037385000},"page":"135-154","source":"Crossref","is-referenced-by-count":16,"title":["Information Technology Audit Quality: An Investigation of the Impact of Individual and Organizational Factors"],"prefix":"10.2308","volume":"35","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9368-4541","authenticated-orcid":true,"given":"M. Dale","family":"Stoel","sequence":"first","affiliation":[{"name":"Miami University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Douglas","family":"Havelka","sequence":"additional","affiliation":[{"name":"Miami University"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"1112","published-online":{"date-parts":[[2020,2,18]]},"reference":[{"key":"2024082915265276200_i1558-7959-35-1-135-Abdolmohammadi1","doi-asserted-by":"crossref","unstructured":"Abdolmohammadi,\n              M.,\n             and\n\t\t\t\t\t\tBossS. R.\n          2010.\n\t\t\t\t\tFactors associated with IT audits by the internal audit function.\n\t\t\t\t\tInternational Journal of Accounting Information Systems11 (\n\t\t\t\t\t3):\n\t\t\t\t\t140\u2013\n\t\t\t\t\t151.\n\t\t\t\t\thttps:\/\/doi.org\/10.1016\/j.accinf.2010.07.004","DOI":"10.1016\/j.accinf.2010.07.004"},{"key":"2024082915265276200_i1558-7959-35-1-135-Alles1","doi-asserted-by":"crossref","unstructured":"Alles,\n              M.,\n             and\n\t\t\t\t\t\tGrayG. L.\n          2012.\n\t\t\t\t\tA relative cost framework of demand for external assurance of XBRL filings.\n\t\t\t\t\tJournal of Information Systems26 (\n\t\t\t\t\t1):\n\t\t\t\t\t103\u2013\n\t\t\t\t\t126.\n\t\t\t\t\thttps:\/\/doi.org\/10.2308\/isys-10248","DOI":"10.2308\/isys-10248"},{"key":"2024082915265276200_i1558-7959-35-1-135-Alles2","doi-asserted-by":"crossref","unstructured":"Alles,\n              M.,\n            \n            \n              Brennan\n              G.,\n            \n            \n              Kogan\n              A.,\n             and\n\t\t\t\t\t\tVasarhelyiM. A.\n          2006.\n\t\t\t\t\tContinuous monitoring of business process controls: A pilot implementation of a continuous auditing system at Siemen.\n\t\t\t\t\tInternational Journal of Accounting Information Systems7 (\n\t\t\t\t\t2):\n\t\t\t\t\t137\u2013\n\t\t\t\t\t161.\n\t\t\t\t\thttps:\/\/doi.org\/10.1016\/J.ACCINF.2005.10.004","DOI":"10.1016\/j.accinf.2005.10.004"},{"key":"2024082915265276200_i1558-7959-35-1-135-Amancei1","unstructured":"Amancei,\n              C.,\n             and\n\t\t\t\t\t\tSurcelT.\n          2010.\n\t\t\t\t\tIncreasing efficiency of IT audit methodology by using the organizations tolerance to IT systems availability.\n\t\t\t\t\tInforma\u00e7\u00f5es Econ\u00f4micas14 (\n\t\t\t\t\t1):\n\t\t\t\t\t49\u2013\n\t\t\t\t\t58."},{"key":"2024082915265276200_i1558-7959-35-1-135-Arena1","doi-asserted-by":"crossref","unstructured":"Arena,\n              M.,\n             and\n\t\t\t\t\t\tAzzoneG.\n          2009.\n\t\t\t\t\tIdentifying organizational drivers for internal audit effectiveness.\n\t\t\t\t\tInternational Journal of Auditing13 (\n\t\t\t\t\t1):\n\t\t\t\t\t43\u2013\n\t\t\t\t\t60.\n\t\t\t\t\thttps:\/\/doi.org\/10.1111\/j.1099-1123.2008.00392.x","DOI":"10.1111\/j.1099-1123.2008.00392.x"},{"key":"2024082915265276200_i1558-7959-35-1-135-Armstrong1","doi-asserted-by":"crossref","unstructured":"Armstrong,\n              J. B.,\n             and\n\t\t\t\t\t\tOvertonT. S.\n          1977.\n\t\t\t\t\tEstimating nonresponse bias in mail surveys.\n\t\t\t\t\tJournal of Marketing Research14 (\n\t\t\t\t\t3):\n\t\t\t\t\t396\u2013\n\t\t\t\t\t402.\n\t\t\t\t\thttps:\/\/doi.org\/10.1177\/002224377701400320","DOI":"10.1177\/002224377701400320"},{"key":"2024082915265276200_i1558-7959-35-1-135-Arnold1","doi-asserted-by":"crossref","unstructured":"Arnold,\n              V.,\n            \n            \n              Lampe\n              J. C.,\n            \n            \n              Masselli\n              J. J.,\n             and\n\t\t\t\t\t\tSuttonS. G.\n          2000.\n\t\t\t\t\tAn analysis of the market for systems reliability assurance services.\n\t\t\t\t\tJournal of Information Systems14(Supplement):65\u2013\n\t\t\t\t\t82.\n\t\t\t\t\thttps:\/\/doi.org\/10.2308\/jis.2000.14.s-1.65","DOI":"10.2308\/jis.2000.14.s-1.65"},{"key":"2024082915265276200_i1558-7959-35-1-135-Bamber1","doi-asserted-by":"crossref","unstructured":"Bamber,\n              E. M.,\n             and\n\t\t\t\t\t\tIyerV. M.\n          2007.\n\t\t\t\t\tAuditor's identification with their clients and its effect on auditors' objectivity.\n\t\t\t\t\tAuditing: A Journal of Practice & Theory26 (\n\t\t\t\t\t2):\n\t\t\t\t\t1\u2013\n\t\t\t\t\t24.\n\t\t\t\t\thttps:\/\/doi.org\/10.2308\/aud.2007.26.2.1","DOI":"10.2308\/aud.2007.26.2.1"},{"key":"2024082915265276200_i1558-7959-35-1-135-Bamber2","unstructured":"Bamber,\n              E. M.,\n            \n            \n              Hill\n              M. C.,\n             and\n\t\t\t\t\t\tWatsonR. T.\n          1998.\n\t\t\t\t\tAudit groups and group support systems: A framework and propositions for future research.\n\t\t\t\t\tJournal of Information Systems12 (\n\t\t\t\t\t2):\n\t\t\t\t\t45\u2013\n\t\t\t\t\t73."},{"key":"2024082915265276200_i1558-7959-35-1-135-Bamber3","unstructured":"Bamber,\n              E. M.,\n            \n            \n              Watson\n              R. T.,\n             and\n\t\t\t\t\t\tHillM. C.\n          1996.\n\t\t\t\t\tThe effects of group support system technology on audit group decision making.\n\t\t\t\t\tAuditing: A Journal of Practice & Theory15 (\n\t\t\t\t\t1):\n\t\t\t\t\t122\u2013\n\t\t\t\t\t134."},{"key":"2024082915265276200_i1558-7959-35-1-135-Bedard1","doi-asserted-by":"crossref","unstructured":"Bedard,\n              J.,\n             and\n\t\t\t\t\t\tGrahamL.\n          2011.\n\t\t\t\t\tDetection and severity classification of Sarbanes-Oxley Section 404 internal control deficiencies.\n\t\t\t\t\tThe Accounting Review86 (\n\t\t\t\t\t3):\n\t\t\t\t\t825\u2013\n\t\t\t\t\t855.\n\t\t\t\t\thttps:\/\/doi.org\/10.2308\/accr.00000036","DOI":"10.2308\/accr.00000036"},{"key":"2024082915265276200_i1558-7959-35-1-135-Bedard2","doi-asserted-by":"crossref","unstructured":"Bedard,\n              J.,\n            \n            \n              Graham\n              L.,\n             and\n\t\t\t\t\t\tJacksonC.\n          2005.\n\t\t\t\t\tInformation systems risk and audit planning.\n\t\t\t\t\tInternational Journal of Auditing9 (\n\t\t\t\t\t2):\n\t\t\t\t\t147\u2013\n\t\t\t\t\t163.\n\t\t\t\t\thttps:\/\/doi.org\/10.1111\/j.1099-1123.2005.00267.x","DOI":"10.1111\/j.1099-1123.2005.00267.x"},{"key":"2024082915265276200_i1558-7959-35-1-135-Boritz1","doi-asserted-by":"crossref","unstructured":"Boritz,\n              J. E.,\n             and\n\t\t\t\t\t\tNoW. G.\n          2009.\n\t\t\t\t\tAssurance on XBRL-related documents: The case of United Technologies Corporation.\n\t\t\t\t\tJournal of Information Systems23 (\n\t\t\t\t\t2):\n\t\t\t\t\t49\u2013\n\t\t\t\t\t78.\n\t\t\t\t\thttps:\/\/doi.org\/10.2308\/jis.2009.23.2.49","DOI":"10.2308\/jis.2009.23.2.49"},{"key":"2024082915265276200_i1558-7959-35-1-135-Braun1","doi-asserted-by":"crossref","unstructured":"Braun,\n              R. L.,\n             and\n\t\t\t\t\t\tDavisH. E.\n          2003.\n\t\t\t\t\tComputer-assisted audit tools and techniques: Analysis and perspective.\n\t\t\t\t\tManagerial Auditing Journal18 (\n\t\t\t\t\t9):\n\t\t\t\t\t725\u2013\n\t\t\t\t\t731.\n\t\t\t\t\thttps:\/\/doi.org\/10.1108\/02686900310500488","DOI":"10.1108\/02686900310500488"},{"key":"2024082915265276200_i1558-7959-35-1-135-Brazel1","doi-asserted-by":"crossref","unstructured":"Brazel,\n              J. F.\n            \n          \n          2005.\n\t\t\t\t\tA measure of perceived auditor ERP systems expertise: Development, assessment, and uses.\n\t\t\t\t\tManagerial Auditing Journal20 (\n\t\t\t\t\t6):\n\t\t\t\t\t619\u2013\n\t\t\t\t\t631.\n\t\t\t\t\thttps:\/\/doi.org\/10.1108\/02686900510606100","DOI":"10.1108\/02686900510606100"},{"key":"2024082915265276200_i1558-7959-35-1-135-Brazel2","doi-asserted-by":"crossref","unstructured":"Brazel,\n              J. F.,\n             and\n\t\t\t\t\t\tAgogliaC. P.\n          2007.\n\t\t\t\t\tAn examination of auditor planning judgments in a complex accounting information systems environment.\n\t\t\t\t\tContemporary Accounting Research24 (\n\t\t\t\t\t4):\n\t\t\t\t\t1059\u2013\n\t\t\t\t\t1083.\n\t\t\t\t\thttps:\/\/doi.org\/10.1506\/car.24.4.1","DOI":"10.1506\/car.24.4.1"},{"key":"2024082915265276200_i1558-7959-35-1-135-Brody1","unstructured":"Brody,\n              R. G.,\n             and\n\t\t\t\t\t\tKearnsG.\n          2009.\n\t\t\t\t\tIT audit approaches for enterprise resource planning systems.\n\t\t\t\t\tICFAI Journal of Audit Practice6 (\n\t\t\t\t\t2):\n\t\t\t\t\t7\u2013\n\t\t\t\t\t26."},{"key":"2024082915265276200_i1558-7959-35-1-135-Canada1","doi-asserted-by":"crossref","unstructured":"Canada,\n              J.,\n            \n            \n              Sutton\n              S. G.,\n             and\n\t\t\t\t\t\tKuhnJ. R.\n          2009.\n\t\t\t\t\tThe pervasive nature of IT controls: An examination of material weaknesses in IT controls and audit fees.\n\t\t\t\t\tInternational Journal of Accounting and Information Management17 (\n\t\t\t\t\t1):\n\t\t\t\t\t106\u2013\n\t\t\t\t\t119.\n\t\t\t\t\thttps:\/\/doi.org\/10.1108\/18347640910967753","DOI":"10.1108\/18347640910967753"},{"key":"2024082915265276200_i1558-7959-35-1-135-Carnaghan1","doi-asserted-by":"crossref","unstructured":"Carnaghan,\n              C.\n            \n          \n          2006.\n\t\t\t\t\tBusiness process modeling approaches in the context of process level audit risk assessment: An analysis and comparison.\n\t\t\t\t\tInternational Journal of Accounting Information Systems7 (\n\t\t\t\t\t2):\n\t\t\t\t\t170\u2013\n\t\t\t\t\t204.\n\t\t\t\t\thttps:\/\/doi.org\/10.1016\/j.accinf.2005.10.005","DOI":"10.1016\/j.accinf.2005.10.005"},{"key":"2024082915265276200_i1558-7959-35-1-135-Cassel1","doi-asserted-by":"crossref","unstructured":"Cassel,\n              C. M.,\n            \n            \n              Hackl\n              P.,\n             and\n\t\t\t\t\t\tWestlundA. H.\n          2000.\n\t\t\t\t\tOn measurement of intangible assets: A study of the robustness of partial least squares.\n\t\t\t\t\tTotal Quality Management11 (\n\t\t\t\t\t7):\n\t\t\t\t\t897\u2013\n\t\t\t\t\t907.\n\t\t\t\t\thttps:\/\/doi.org\/10.1080\/09544120050135443","DOI":"10.1080\/09544120050135443"},{"key":"2024082915265276200_i1558-7959-35-1-135-Chin1","unstructured":"Chin,\n              W. W.\n            \n          \n          1998.\n\t\t\t\t\tIssues and opinion on structural equation modeling.\n\t\t\t\t\tMIS Quarterly22 (\n\t\t\t\t\t1):\n\t\t\t\t\tvii\u2013\n\t\t\t\t\txvi."},{"key":"2024082915265276200_i1558-7959-35-1-135-Chin2","doi-asserted-by":"crossref","unstructured":"Chin,\n              W. W.,\n            \n            \n              Marcolin\n              B. L.,\n             and\n\t\t\t\t\t\tNewstedP. R.\n          2003.\n\t\t\t\t\tA partial least squares latent variable modeling approach for measuring interaction effects: Results from a Monte Carlo simulation study and an electronic mail emotion\/adoption study.\n\t\t\t\t\tInformation Systems Research14 (\n\t\t\t\t\t2):\n\t\t\t\t\t189\u2013\n\t\t\t\t\t217.\n\t\t\t\t\thttps:\/\/doi.org\/10.1287\/isre.14.2.189.16018","DOI":"10.1287\/isre.14.2.189.16018"},{"key":"2024082915265276200_i1558-7959-35-1-135-Chiu1","doi-asserted-by":"crossref","unstructured":"Chiu,\n              V.,\n            \n            \n              Liu\n              Q.,\n             and\n\t\t\t\t\t\tVasarhelyiM. A.\n          2014.\n\t\t\t\t\tThe development and intellectual structure of continuous auditing research.\n\t\t\t\t\tJournal of Accounting Literature33 (\n\t\t\t\t\t1-2):\n\t\t\t\t\t37\u2013\n\t\t\t\t\t57.\n\t\t\t\t\thttps:\/\/doi.org\/10.1016\/J.ACCLIT.2014.08.001","DOI":"10.1016\/j.acclit.2014.08.001"},{"key":"2024082915265276200_i1558-7959-35-1-135-Curtis1","doi-asserted-by":"crossref","unstructured":"Curtis,\n              M. B.,\n            \n            \n              Jenkins\n              J. G.,\n            \n            \n              Bedard\n              J. C.,\n             and\n\t\t\t\t\t\tDeisD.\n          2009.\n\t\t\t\t\tAuditors' training and proficiency in information systems: A research synthesis.\n\t\t\t\t\tJournal of Information Systems23 (\n\t\t\t\t\t1):\n\t\t\t\t\t79\u2013\n\t\t\t\t\t96.\n\t\t\t\t\thttps:\/\/doi.org\/10.2308\/jis.2009.23.1.79","DOI":"10.2308\/jis.2009.23.1.79"},{"key":"2024082915265276200_i1558-7959-35-1-135-Daigle1","doi-asserted-by":"crossref","unstructured":"Daigle,\n              R. J.,\n             and\n\t\t\t\t\t\tLampeJ. C.\n          2004.\n\t\t\t\t\tThe impact of the risk of consequence on the relative demand for continuous online assurance.\n\t\t\t\t\tInternational Journal of Accounting Information Systems5 (\n\t\t\t\t\t3):\n\t\t\t\t\t313\u2013\n\t\t\t\t\t340.\n\t\t\t\t\thttps:\/\/doi.org\/10.1016\/j.accinf.2004.06.001","DOI":"10.1016\/j.accinf.2004.06.001"},{"key":"2024082915265276200_i1558-7959-35-1-135-Daigle2","doi-asserted-by":"crossref","unstructured":"Daigle,\n              R. J.,\n            \n            \n              Kizirian\n              T.,\n             and\n\t\t\t\t\t\tSneathen,L. D.Jr.\n\t\t\t\t\t\n          2005.\n\t\t\t\t\tSystems controls reliability and assessment effort.\n\t\t\t\t\tInternational Journal of Auditing9 (\n\t\t\t\t\t1):\n\t\t\t\t\t79\u2013\n\t\t\t\t\t90.\n\t\t\t\t\thttps:\/\/doi.org\/10.1111\/j.1099-1123.2005.00103.x","DOI":"10.1111\/j.1099-1123.2005.00103.x"},{"key":"2024082915265276200_i1558-7959-35-1-135-Debreceny1","doi-asserted-by":"crossref","unstructured":"Debreceny,\n              R. S.,\n            \n            \n              Gray\n              G. L.,\n            \n            \n              Ng\n              J.,\n            \n            \n              Lee\n              K.,\n             and\n\t\t\t\t\t\tYauW.-F.\n          2005.\n\t\t\t\t\tEmbedded audit modules in enterprise resource planning systems: Implementation and functionality.\n\t\t\t\t\tJournal of Information Systems19 (\n\t\t\t\t\t2):\n\t\t\t\t\t7\u2013\n\t\t\t\t\t27.\n\t\t\t\t\thttps:\/\/doi.org\/10.2308\/jis.2005.19.2.7","DOI":"10.2308\/jis.2005.19.2.7"},{"key":"2024082915265276200_i1558-7959-35-1-135-Dowling1","doi-asserted-by":"crossref","unstructured":"Dowling,\n              C.,\n             and\n\t\t\t\t\t\tLeechS.\n          2007.\n\t\t\t\t\tAudit support systems and decision aids: Current practice and opportunities for future research.\n\t\t\t\t\tInternational Journal of Accounting Information Systems8 (\n\t\t\t\t\t2):\n\t\t\t\t\t92\u2013\n\t\t\t\t\t116.\n\t\t\t\t\thttps:\/\/doi.org\/10.1016\/J.ACCINF.2007.04.001","DOI":"10.1016\/j.accinf.2007.04.001"},{"key":"2024082915265276200_i1558-7959-35-1-135-Dzuranin1","doi-asserted-by":"crossref","unstructured":"Dzuranin,\n              A. C.,\n             and\n\t\t\t\t\t\tM\u0103l\u0103escuI.\n          2016.\n\t\t\t\t\tThe current state and future direction of IT audit: Challenges and opportunities.\n\t\t\t\t\tJournal of Information Systems30 (\n\t\t\t\t\t1):\n\t\t\t\t\t7\u2013\n\t\t\t\t\t20.\n\t\t\t\t\thttps:\/\/doi.org\/10.2308\/isys-51315","DOI":"10.2308\/isys-51315"},{"key":"2024082915265276200_i1558-7959-35-1-135-Fiegerman1","unstructured":"Fiegerman,\n              S.\n            \n          \n          2017.\n\t\t\t\t\tThe biggest data breaches ever.\n\t\t\t\t\tAvailable at: https:\/\/money.cnn.com\/2017\/09\/07\/technology\/business\/biggest-breaches-ever\/index.html"},{"key":"2024082915265276200_i1558-7959-35-1-135-Filipek1","unstructured":"Filipek,\n              R.\n            \n          \n          2007.\n\t\t\t\t\tIT audit skills found lacking.\n\t\t\t\t\tInternal Auditor64 (\n\t\t\t\t\t3):\n\t\t\t\t\t15\u2013\n\t\t\t\t\t16."},{"key":"2024082915265276200_i1558-7959-35-1-135-Garsombke1","unstructured":"Garsombke,\n              H. P.,\n             and\n\t\t\t\t\t\tTaborR. H.\n          1986.\n\t\t\t\t\tFactors explaining the use of EDP audit techniques.\n\t\t\t\t\tJournal of Information Systems1:\n\t\t\t\t\t48\u2013\n\t\t\t\t\t66."},{"key":"2024082915265276200_i1558-7959-35-1-135-Gaynor1","doi-asserted-by":"crossref","unstructured":"Gaynor,\n              L. M.,\n            \n            \n              Kelton\n              A. S.,\n            \n            \n              Mercer\n              M.,\n             and\n\t\t\t\t\t\tYohnT. L.\n          2016.\n\t\t\t\t\tUnderstanding the relation between financial reporting quality and audit quality.\n\t\t\t\t\tAuditing: A Journal of Practice & Theory35 (\n\t\t\t\t\t4):\n\t\t\t\t\t1\u2013\n\t\t\t\t\t22.\n\t\t\t\t\thttps:\/\/doi.org\/10.2308\/ajpt-51453","DOI":"10.2308\/ajpt-51453"},{"key":"2024082915265276200_i1558-7959-35-1-135-Gefen1","doi-asserted-by":"crossref","unstructured":"Gefen,\n              D.,\n             and\n\t\t\t\t\t\tStraubD.\n          2005.\n\t\t\t\t\tA practical guide to factorial validity using PLS-Graph: Tutorial and annotated example.\n\t\t\t\t\tCommunications of the AIS16:\n\t\t\t\t\t91\u2013\n\t\t\t\t\t109.\n\t\t\t\t\thttps:\/\/doi.org\/10.17705\/1CAIS.01605","DOI":"10.17705\/1CAIS.01605"},{"key":"2024082915265276200_i1558-7959-35-1-135-Gefen2","doi-asserted-by":"crossref","unstructured":"Gefen,\n              D.,\n            \n            \n              Rigdon\n              E.,\n             and\n\t\t\t\t\t\tStraubD.\n          2011.\n\t\t\t\t\tAn update and extension to SEM guidelines for administrative and social science research.\n\t\t\t\t\tMIS Quarterly35 (\n\t\t\t\t\t2):\n\t\t\t\t\tiii\u2013\n\t\t\t\t\txiv.\n\t\t\t\t\thttps:\/\/doi.org\/10.2307\/23044042","DOI":"10.2307\/23044042"},{"key":"2024082915265276200_i1558-7959-35-1-135-Green1","doi-asserted-by":"crossref","unstructured":"Green,\n              P. E.,\n             and\n\t\t\t\t\t\tSrinivasanV.\n          1978.\n\t\t\t\t\tConjoint analysis in consumer research: Issues and outlook.\n\t\t\t\t\tThe Journal of Consumer Research5 (\n\t\t\t\t\t2):\n\t\t\t\t\t103\u2013\n\t\t\t\t\t123.\n\t\t\t\t\thttps:\/\/doi.org\/10.1086\/208721","DOI":"10.1086\/208721"},{"key":"2024082915265276200_i1558-7959-35-1-135-Green2","doi-asserted-by":"crossref","unstructured":"Green,\n              P. E.,\n             and\n\t\t\t\t\t\tSrinivasanV.\n          1990.\n\t\t\t\t\tConjoint analysis in marketing: New developments with implications for research and practice.\n\t\t\t\t\tJournal of Marketing54 (\n\t\t\t\t\t4):\n\t\t\t\t\t3\u2013\n\t\t\t\t\t19.\n\t\t\t\t\thttps:\/\/doi.org\/10.1177\/002224299005400402","DOI":"10.1177\/002224299005400402"},{"key":"2024082915265276200_i1558-7959-35-1-135-Greenstein1","doi-asserted-by":"crossref","unstructured":"Greenstein,\n              M.,\n             and\n\t\t\t\t\t\tMcKeeT. E.\n          2004.\n\t\t\t\t\tAssurance practitioners' and educators' self-perceived IT knowledge level: An empirical assessment.\n\t\t\t\t\tInternational Journal of Accounting Information Systems5 (\n\t\t\t\t\t2):\n\t\t\t\t\t213\u2013\n\t\t\t\t\t243.\n\t\t\t\t\thttps:\/\/doi.org\/10.1016\/j.accinf.2004.04.002","DOI":"10.1016\/j.accinf.2004.04.002"},{"key":"2024082915265276200_i1558-7959-35-1-135-Greenstein2","doi-asserted-by":"crossref","unstructured":"Greenstein,\n              M.,\n             and\n\t\t\t\t\t\tRayA. W.\n          2002.\n\t\t\t\t\tHolistic, continuous assurance integration: E-business opportunities and challenges.\n\t\t\t\t\tJournal of Information Systems16(Supplement):1\u2013\n\t\t\t\t\t20.\n\t\t\t\t\thttps:\/\/doi.org\/10.2308\/jis.2002.16.s-1.1","DOI":"10.2308\/jis.2002.16.s-1.1"},{"key":"2024082915265276200_i1558-7959-35-1-135-Groomer1","unstructured":"Groomer,\n              S. M.,\n             and\n\t\t\t\t\t\tMurthyU. S.\n          1989.\n\t\t\t\t\tContinuous auditing of database applications: An embedded audit module approach.\n\t\t\t\t\tJournal of Information Systems3 (\n\t\t\t\t\t2):\n\t\t\t\t\t53."},{"key":"2024082915265276200_i1558-7959-35-1-135-Havelka1","doi-asserted-by":"crossref","unstructured":"Havelka,\n              D.,\n             and\n\t\t\t\t\t\tMerhoutJ. W.\n          2013.\n\t\t\t\t\tInternal information technology audit process quality: Theory development using structured group processes.\n\t\t\t\t\tInternational Journal of Accounting Information Systems14 (\n\t\t\t\t\t3):\n\t\t\t\t\t165\u2013\n\t\t\t\t\t192.\n\t\t\t\t\thttps:\/\/doi.org\/10.1016\/j.accinf.2012.12.001","DOI":"10.1016\/j.accinf.2012.12.001"},{"key":"2024082915265276200_i1558-7959-35-1-135-Havelka2","unstructured":"Havelka,\n              D.,\n            \n            \n              Sutton\n              S. G.,\n             and\n\t\t\t\t\t\tArnoldV.\n          1998.\n\t\t\t\t\tA methodology for developing measurement criteria for assurance services: An application in information systems assurance.\n\t\t\t\t\tAuditing: A Journal of Practice & Theory17(Supplement):73\u2013\n\t\t\t\t\t92."},{"key":"2024082915265276200_i1558-7959-35-1-135-Howard1","unstructured":"Howard,\n              T.\n            \n          \n          1981.\n\t\t\t\t\tAttitude measurement: Some further considerations.\n\t\t\t\t\tThe Accounting Review56 (\n\t\t\t\t\t3):\n\t\t\t\t\t613\u2013\n\t\t\t\t\t621."},{"key":"2024082915265276200_i1558-7959-35-1-135-Howard2","unstructured":"Howard,\n              T.,\n             and\n\t\t\t\t\t\tNikolaiL.\n          1983.\n\t\t\t\t\tAttitude measurement and perceptions of accounting faculty publication outlets.\n\t\t\t\t\tThe Accounting Review58 (\n\t\t\t\t\t4):\n\t\t\t\t\t765\u2013\n\t\t\t\t\t776."},{"key":"2024082915265276200_i1558-7959-35-1-135-Janvrin1","doi-asserted-by":"crossref","unstructured":"Janvrin,\n              D.,\n            \n            \n              Bierstaker\n              J.,\n             and\n\t\t\t\t\t\tLoweD. J.\n          2008.\n\t\t\t\t\tAn examination of audit information technology use and perceived importance.\n\t\t\t\t\tAccounting Horizons22 (\n\t\t\t\t\t1):\n\t\t\t\t\t1\u2013\n\t\t\t\t\t21.\n\t\t\t\t\thttps:\/\/doi.org\/10.2308\/acch.2008.22.1.1","DOI":"10.2308\/acch.2008.22.1.1"},{"key":"2024082915265276200_i1558-7959-35-1-135-Janvrin2","doi-asserted-by":"crossref","unstructured":"Janvrin,\n              D.,\n            \n            \n              Bierstaker\n              J.,\n             and\n\t\t\t\t\t\tLoweD. J.\n          2009.\n\t\t\t\t\tAn investigation of factors influencing the use of computer-related audit procedures.\n\t\t\t\t\tJournal of Information Systems23 (\n\t\t\t\t\t1):\n\t\t\t\t\t97\u2013\n\t\t\t\t\t118.\n\t\t\t\t\thttps:\/\/doi.org\/10.2308\/jis.2009.23.1.97","DOI":"10.2308\/jis.2009.23.1.97"},{"key":"2024082915265276200_i1558-7959-35-1-135-Knechel1","doi-asserted-by":"crossref","unstructured":"Knechel,\n              W. R.,\n            \n            \n              Krishnan\n              G. V.,\n            \n            \n              Pevzner\n              M.,\n            \n            \n              Shefchik\n              L. B.,\n             and\n\t\t\t\t\t\tVeluryU. K.\n          2013.\n\t\t\t\t\tAuditing quality: Insights from the academic literature.\n\t\t\t\t\tAuditing: A Journal of Practice & Theory32(Supplement):385\u2013\n\t\t\t\t\t421.\n\t\t\t\t\thttps:\/\/doi.org\/10.2308\/ajpt-50350","DOI":"10.2308\/ajpt-50350"},{"key":"2024082915265276200_i1558-7959-35-1-135-Kuhn1","doi-asserted-by":"crossref","unstructured":"Kuhn,\n              J. R.,\n              Jr.,\n             and\n\t\t\t\t\t\tSuttonS. G.\n          2010.\n\t\t\t\t\tContinuous auditing in ERP system environments: The current state and future directions.\n\t\t\t\t\tJournal of Information Systems24 (\n\t\t\t\t\t1):\n\t\t\t\t\t91\u2013\n\t\t\t\t\t112.\n\t\t\t\t\thttps:\/\/doi.org\/10.2308\/jis.2010.24.1.91","DOI":"10.2308\/jis.2010.24.1.91"},{"key":"2024082915265276200_i1558-7959-35-1-135-Li1","doi-asserted-by":"crossref","unstructured":"Li,\n              C.,\n            \n            \n              Peters\n              G. F.,\n            \n            \n              Richardson\n              V. J.,\n             and\n\t\t\t\t\t\tWatsonM. W.\n          2012.\n\t\t\t\t\tThe consequences of information technology control weaknesses on management information systems: The case of Sarbanes-Oxley internal control reports.\n\t\t\t\t\tMIS Quarterly36 (\n\t\t\t\t\t1):\n\t\t\t\t\t179\u2013\n\t\t\t\t\t204.\n\t\t\t\t\thttps:\/\/doi.org\/10.2307\/41410413","DOI":"10.2307\/41410413"},{"key":"2024082915265276200_i1558-7959-35-1-135-Lovata1","unstructured":"Lovata,\n              L. M.\n            \n          \n          1990.\n\t\t\t\t\tAudit technology and the use of computer assisted audit techniques.\n\t\t\t\t\tJournal of Information Systems4 (\n\t\t\t\t\t2):\n\t\t\t\t\t60\u2013\n\t\t\t\t\t68."},{"key":"2024082915265276200_i1558-7959-35-1-135-Lunardi1","doi-asserted-by":"crossref","unstructured":"Lunardi,\n              G. L.,\n            \n            \n              Ma\u00e7ada\n              A. C. G.,\n            \n            \n              Becker\n              J. L.,\n             and\n\t\t\t\t\t\tVan GrembergenW.\n          2017.\n\t\t\t\t\tAntecedents of IT governance effectiveness: An empirical examination in Brazilian firms.\n\t\t\t\t\tJournal of Information Systems31 (\n\t\t\t\t\t1):\n\t\t\t\t\t41\u2013\n\t\t\t\t\t57.\n\t\t\t\t\thttps:\/\/doi.org\/10.2308\/isys-51626","DOI":"10.2308\/isys-51626"},{"key":"2024082915265276200_i1558-7959-35-1-135-Majdalawieh1","doi-asserted-by":"crossref","unstructured":"Majdalawieh,\n              M.,\n             and\n\t\t\t\t\t\tZaghloulI.\n          2009.\n\t\t\t\t\tParadigm shift in information systems auditing.\n\t\t\t\t\tManagerial Auditing Journal24 (\n\t\t\t\t\t4):\n\t\t\t\t\t352\u2013\n\t\t\t\t\t367.\n\t\t\t\t\thttps:\/\/doi.org\/10.1108\/02686900910948198","DOI":"10.1108\/02686900910948198"},{"key":"2024082915265276200_i1558-7959-35-1-135-Masli1","doi-asserted-by":"crossref","unstructured":"Masli,\n              A.,\n            \n            \n              Peters\n              G. F.,\n            \n            \n              Richardson\n              V. J.,\n             and\n\t\t\t\t\t\tSanchezJ. M.\n          2010.\n\t\t\t\t\tExamining the potential benefits of internal control monitoring technology.\n\t\t\t\t\tThe Accounting Review85 (\n\t\t\t\t\t3):\n\t\t\t\t\t1001\u2013\n\t\t\t\t\t1034.\n\t\t\t\t\thttps:\/\/doi.org\/10.2308\/accr.2010.85.3.1001","DOI":"10.2308\/accr.2010.85.3.1001"},{"key":"2024082915265276200_i1558-7959-35-1-135-Morris1","unstructured":"Morris,\n              B. W.,\n             and\n\t\t\t\t\t\tPushkinA. B.\n          1995.\n\t\t\t\t\tDeterminants of information systems audit involvement in EDI systems development.\n\t\t\t\t\tJournal of Information Systems9 (\n\t\t\t\t\t2):\n\t\t\t\t\t111\u2013\n\t\t\t\t\t128."},{"key":"2024082915265276200_i1558-7959-35-1-135-ODonnell1","doi-asserted-by":"crossref","unstructured":"O'Donnell,\n              E.\n            \n          \n          2003.\n\t\t\t\t\tThe influence of process-focused knowledge acquisition on evaluative judgment during a system assurance task.\n\t\t\t\t\tInternational Journal of Accounting Information Systems4 (\n\t\t\t\t\t2):\n\t\t\t\t\t115\u2013\n\t\t\t\t\t139.\n\t\t\t\t\thttps:\/\/doi.org\/10.1016\/S1467-0895(03)00006-X","DOI":"10.1016\/S1467-0895(03)00006-X"},{"key":"2024082915265276200_i1558-7959-35-1-135-ODonnell2","doi-asserted-by":"crossref","unstructured":"O'Donnell,\n              E.,\n             and\n\t\t\t\t\t\tSchultz,J. J.Jr.\n\t\t\t\t\t\n          2003.\n\t\t\t\t\tThe influence of business-process-focused audit support software on analytical procedures judgments.\n\t\t\t\t\tAuditing: A Journal of Practice & Theory22 (\n\t\t\t\t\t2):\n\t\t\t\t\t265\u2013\n\t\t\t\t\t279.\n\t\t\t\t\thttps:\/\/doi.org\/10.2308\/aud.2003.22.2.265","DOI":"10.2308\/aud.2003.22.2.265"},{"key":"2024082915265276200_i1558-7959-35-1-135-ODonnell3","doi-asserted-by":"crossref","unstructured":"O'Donnell,\n              E.,\n            \n            \n              Arnold\n              V.,\n             and\n\t\t\t\t\t\tSuttonS. G.\n          2000.\n\t\t\t\t\tAn analysis of the group dynamics surrounding internal control assessment in information systems audit and assurance domains.\n\t\t\t\t\tJournal of Information Systems14(Supplement):97\u2013\n\t\t\t\t\t116.\n\t\t\t\t\thttps:\/\/doi.org\/10.2308\/jis.2000.14.s-1.97","DOI":"10.2308\/jis.2000.14.s-1.97"},{"key":"2024082915265276200_i1558-7959-35-1-135-Omoteso1","doi-asserted-by":"crossref","unstructured":"Omoteso,\n              K.,\n            \n            \n              Patel\n              A.,\n             and\n\t\t\t\t\t\tScottP.\n          2010.\n\t\t\t\t\tInformation and communications technology and auditing: Current implications and future directions.\n\t\t\t\t\tInternational Journal of Auditing14 (\n\t\t\t\t\t2):\n\t\t\t\t\t147\u2013\n\t\t\t\t\t162.\n\t\t\t\t\thttps:\/\/doi.org\/10.1111\/j.1099-1123.2009.00410.x","DOI":"10.1111\/j.1099-1123.2009.00410.x"},{"key":"2024082915265276200_i1558-7959-35-1-135-Pathak1","unstructured":"Pathak,\n              J.,\n            \n            \n              Lind\n              M.,\n             and\n\t\t\t\t\t\tAbdolmohammadiM.\n          2010.\n\t\t\t\t\tE-commerce audit judgment expertise: Does expertise in system change management and information technology auditing mediate e-commerce audit judgment expertise?Informa\u00e7\u00f5es Econ\u00f4micas14 (\n\t\t\t\t\t1):\n\t\t\t\t\t5\u2013\n\t\t\t\t\t20."},{"key":"2024082915265276200_i1558-7959-35-1-135-Petterson1","doi-asserted-by":"crossref","unstructured":"Petterson,\n              M.\n            \n          \n          2005.\n\t\t\t\t\tThe keys to effective IT auditing.\n\t\t\t\t\tJournal of Corporate Accounting & Finance16 (\n\t\t\t\t\t5):\n\t\t\t\t\t41\u2013\n\t\t\t\t\t46.\n\t\t\t\t\thttps:\/\/doi.org\/10.1002\/jcaf.20134","DOI":"10.1002\/jcaf.20134"},{"key":"2024082915265276200_i1558-7959-35-1-135-Prasad1","doi-asserted-by":"crossref","unstructured":"Prasad,\n              A.,\n             and\n\t\t\t\t\t\tGreenP.\n          2015.\n\t\t\t\t\tOrganizational competencies and dynamic accounting information system capability: Impact on AIS processes and firm performance.\n\t\t\t\t\tJournal of Information Systems29 (\n\t\t\t\t\t3):\n\t\t\t\t\t123\u2013\n\t\t\t\t\t149.\n\t\t\t\t\thttps:\/\/doi.org\/10.2308\/isys-51127","DOI":"10.2308\/isys-51127"},{"key":"2024082915265276200_i1558-7959-35-1-135-Sakka1","doi-asserted-by":"crossref","unstructured":"Sakka,\n              O.,\n            \n            \n              Barki\n              H.,\n             and\n\t\t\t\t\t\tCoteL.\n          2013.\n\t\t\t\t\tInteractive and diagnostic uses of management control systems in IS projects: Antecedents and their impact on performance.\n\t\t\t\t\tInformation & Management50 (\n\t\t\t\t\t6):\n\t\t\t\t\t265\u2013\n\t\t\t\t\t274.\n\t\t\t\t\thttps:\/\/doi.org\/10.1016\/J.IM.2013.02.008","DOI":"10.1016\/j.im.2013.02.008"},{"key":"2024082915265276200_i1558-7959-35-1-135-Srivastava1","doi-asserted-by":"crossref","unstructured":"Srivastava,\n              R. P.,\n             and\n\t\t\t\t\t\tKoganA.\n          2010.\n\t\t\t\t\tAssurance on XBRL instance document: A conceptual framework of assertion.\n\t\t\t\t\tInternational Journal of Accounting Information Systems11 (\n\t\t\t\t\t3):\n\t\t\t\t\t261\u2013\n\t\t\t\t\t273.\n\t\t\t\t\thttps:\/\/doi.org\/10.1016\/J.ACCINF.2010.07.019","DOI":"10.1016\/j.accinf.2010.07.019"},{"key":"2024082915265276200_i1558-7959-35-1-135-Steckel1","doi-asserted-by":"crossref","unstructured":"Steckel,\n              J. H.,\n            \n            \n              DeSarbo\n              W. S.,\n             and\n\t\t\t\t\t\tMahajanV.\n          1991.\n\t\t\t\t\tOn the creation of acceptable conjoint analysis experimental designs.\n\t\t\t\t\tDecision Sciences22 (\n\t\t\t\t\t2):\n\t\t\t\t\t435\u2013\n\t\t\t\t\t442.\n\t\t\t\t\thttps:\/\/doi.org\/10.1111\/j.1540-5915.1991.tb00357.x","DOI":"10.1111\/j.1540-5915.1991.tb00357.x"},{"key":"2024082915265276200_i1558-7959-35-1-135-Steinbart1","doi-asserted-by":"crossref","unstructured":"Steinbart,\n              P. J.,\n            \n            \n              Raschke\n              R. L.,\n            \n            \n              Gal\n              G.,\n             and\n\t\t\t\t\t\tDillaW. N.\n          2016.\n\t\t\t\t\tSECURQUAL: An instrument for evaluating the effectiveness of enterprise information security programs.\n\t\t\t\t\tJournal of Information Systems30 (\n\t\t\t\t\t1):\n\t\t\t\t\t71\u2013\n\t\t\t\t\t92.\n\t\t\t\t\thttps:\/\/doi.org\/10.2308\/isys-51257","DOI":"10.2308\/isys-51257"},{"key":"2024082915265276200_i1558-7959-35-1-135-Stoel1","doi-asserted-by":"crossref","unstructured":"Stoel,\n              D.,\n            \n            \n              Havelka\n              D.,\n             and\n\t\t\t\t\t\tMerhoutJ. W.\n          2012.\n\t\t\t\t\tAn analysis of attributes that impact information technology audit quality: A study of IT and financial audit practitioners.\n\t\t\t\t\tInternational Journal of Accounting Information Systems13 (\n\t\t\t\t\t1):\n\t\t\t\t\t60\u2013\n\t\t\t\t\t79.\n\t\t\t\t\thttps:\/\/doi.org\/10.1016\/j.accinf.2011.11.001","DOI":"10.1016\/j.accinf.2011.11.001"},{"key":"2024082915265276200_i1558-7959-35-1-135-Sutton1","doi-asserted-by":"crossref","unstructured":"Sutton,\n              S. G.,\n             and\n\t\t\t\t\t\tHamptonC.\n          2003.\n\t\t\t\t\tRisk assessment in an extended enterprise environment: Redefining the audit model.\n\t\t\t\t\tInternational Journal of Accounting Information Systems4 (\n\t\t\t\t\t1):\n\t\t\t\t\t57\u2013\n\t\t\t\t\t73.\n\t\t\t\t\thttps:\/\/doi.org\/10.1016\/S1467-0895(03)00010-1","DOI":"10.1016\/S1467-0895(03)00010-1"},{"key":"2024082915265276200_i1558-7959-35-1-135-Viator1","unstructured":"Viator,\n              R. E.,\n             and\n\t\t\t\t\t\tCurtisM. B.\n          1998.\n\t\t\t\t\tComputer auditor reliance on automated and non-automated controls as a function of training and experience.\n\t\t\t\t\tJournal of Information Systems12 (\n\t\t\t\t\t1):\n\t\t\t\t\t19."},{"key":"2024082915265276200_i1558-7959-35-1-135-Vincent1","doi-asserted-by":"crossref","unstructured":"Vincent,\n              N. E.,\n            \n            \n              Higgs\n              J. L.,\n             and\n\t\t\t\t\t\tPinskerR. E.\n          2017.\n\t\t\t\t\tIT governance and the maturity of IT risk management practices.\n\t\t\t\t\tJournal of Information Systems31 (\n\t\t\t\t\t1):\n\t\t\t\t\t59\u2013\n\t\t\t\t\t77.\n\t\t\t\t\thttps:\/\/doi.org\/10.2308\/isys-51365","DOI":"10.2308\/isys-51365"},{"key":"2024082915265276200_i1558-7959-35-1-135-Weidenmier1","doi-asserted-by":"crossref","unstructured":"Weidenmier,\n              M. L.,\n             and\n\t\t\t\t\t\tRamamoortiS.\n          2006.\n\t\t\t\t\tResearch opportunities in information technology and internal auditing.\n\t\t\t\t\tJournal of Information Systems20 (\n\t\t\t\t\t1):\n\t\t\t\t\t205\u2013\n\t\t\t\t\t219.\n\t\t\t\t\thttps:\/\/doi.org\/10.2308\/jis.2006.20.1.205","DOI":"10.2308\/jis.2006.20.1.205"},{"key":"2024082915265276200_i1558-7959-35-1-135-Westland1","doi-asserted-by":"crossref","unstructured":"Westland,\n              J. C.\n            \n          \n          1990.\n\t\t\t\t\tAssessing the economic benefits of information systems auditing.\n\t\t\t\t\tInformation Systems Research1 (\n\t\t\t\t\t3):\n\t\t\t\t\t309\u2013\n\t\t\t\t\t324.\n\t\t\t\t\thttps:\/\/doi.org\/10.1287\/isre.1.3.309","DOI":"10.1287\/isre.1.3.309"},{"key":"2024082915265276200_i1558-7959-35-1-135-Wilkinson1","doi-asserted-by":"crossref","unstructured":"Wilkinson,\n              D.\n            \n          \n          2004.\n\t\t\t\t\tThe CICA's IT competency model.\n\t\t\t\t\tInternational Journal of Accounting Information Systems5 (\n\t\t\t\t\t2):\n\t\t\t\t\t245\u2013\n\t\t\t\t\t250.\n\t\t\t\t\thttps:\/\/doi.org\/10.1016\/j.accinf.2004.04.003","DOI":"10.1016\/j.accinf.2004.04.003"},{"key":"2024082915265276200_i1558-7959-35-1-135-Wright1","unstructured":"Wright,\n              M. K.,\n             and\n\t\t\t\t\t\tCappsC. J.III.\n\t\t\t\t\t\n          2012.\n\t\t\t\t\tAuditor independence and internal information systems audit quality.\n\t\t\t\t\tBusiness Studies Journal4:\n\t\t\t\t\t63\u2013\n\t\t\t\t\t83."},{"key":"2024082915265276200_i1558-7959-35-1-135-Wright2","doi-asserted-by":"crossref","unstructured":"Wright,\n              S.,\n             and\n\t\t\t\t\t\tWrightA. M.\n          2002.\n\t\t\t\t\tInformation system assurance for enterprise resource planning systems: Unique risk considerations.\n\t\t\t\t\tJournal of Information Systems16(Supplement):99\u2013\n\t\t\t\t\t113.\n\t\t\t\t\thttps:\/\/doi.org\/10.2308\/jis.2002.16.s-1.99","DOI":"10.2308\/jis.2002.16.s-1.99"}],"container-title":["Journal of Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/publications.aaahq.org\/jis\/article-pdf\/35\/1\/135\/7506\/i1558-7959-35-1-135.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/publications.aaahq.org\/jis\/article-pdf\/35\/1\/135\/7506\/i1558-7959-35-1-135.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T16:56:39Z","timestamp":1724950599000},"score":1,"resource":{"primary":{"URL":"https:\/\/publications.aaahq.org\/jis\/article\/35\/1\/135\/942\/Information-Technology-Audit-Quality-An"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,18]]},"references-count":74,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2020,2,18]]},"published-print":{"date-parts":[[2021,3,1]]}},"URL":"https:\/\/doi.org\/10.2308\/isys-18-043","relation":{},"ISSN":["1558-7959","0888-7985"],"issn-type":[{"value":"1558-7959","type":"electronic"},{"value":"0888-7985","type":"print"}],"subject":[],"published":{"date-parts":[[2020,2,18]]}}}