{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:49:54Z","timestamp":1757544594037,"version":"3.37.3"},"reference-count":47,"publisher":"American Accounting Association","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,9,1]]},"abstract":"<jats:title>ABSTRACT<\/jats:title>\n               <jats:p>In this paper, we examine the relationship between (1) information technology-related internal control material weaknesses (ITMWs) as reported by public companies between 2004 and 2012, and (2) earnings management. Prior research suggests that companies with internal control deficiencies are more likely to manage earnings; however, no study has specifically examined the incremental effect of ITMWs on earnings management tendencies. Based on a sample of 268 firm-years of ITMWs disclosed by U.S. public companies in their annual SEC filings (pursuant to Section 404 of the Sarbanes-Oxley Act of 2002), we find a significant positive association between ITMWs and income-increasing abnormal accruals. In addition, we find a positive relation between poor financial condition and material weaknesses in these companies. These results are robust with respect to two control samples of firms with non-IT-related-only material weaknesses (non-ITMWs) and firms with no material weakness disclosures. Implications of these findings for investors, regulators, and future research are discussed.<\/jats:p>","DOI":"10.2308\/isys-51884","type":"journal-article","created":{"date-parts":[[2017,8,31]],"date-time":"2017-08-31T22:04:50Z","timestamp":1504217090000},"page":"53-64","source":"Crossref","is-referenced-by-count":5,"title":["The Association between IT Material Weaknesses and Earnings Management"],"prefix":"10.2308","volume":"32","author":[{"given":"William G.","family":"Heninger","sequence":"first","affiliation":[{"name":"Brigham Young University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0643-4649","authenticated-orcid":true,"given":"Eric N.","family":"Johnson","sequence":"additional","affiliation":[{"name":"University of Wyoming"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"John R.","family":"Kuhn","sequence":"additional","affiliation":[{"name":"Stetson University"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"1112","published-online":{"date-parts":[[2017,8,1]]},"reference":[{"key":"2024082915322043600_i1558-7959-32-3-53-ActivePowerInc1","unstructured":"Active Power, Inc. 2004. Form 10-K. Available at: https:\/\/www.sec.gov\/Archives\/edgar\/data\/1044435\/000119312505051092\/d10k.htm"},{"issue":"9","key":"2024082915322043600_i1558-7959-32-3-53-Anderson1","doi-asserted-by":"crossref","first-page":"1359","DOI":"10.1287\/mnsc.1060.0542","article-title":"Value implications of investments in information technology","volume":"52","author":"Anderson","year":"2006","journal-title":"Management Science"},{"issue":"4","key":"2024082915322043600_i1558-7959-32-3-53-Arnold1","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1016\/j.accinf.2011.05.001","article-title":"Do Section 404 disclosures affect investors' perceptions of information systems reliability and stock price predictions?","volume":"12","author":"Arnold","year":"2011","journal-title":"International Journal of Accounting Information Systems"},{"issue":"1","key":"2024082915322043600_i1558-7959-32-3-53-Balsam1","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1111\/1911-3846.12018","article-title":"Equity incentives and internal control weaknesses","volume":"31","author":"Balsam","year":"2014","journal-title":"Contemporary Accounting Research"},{"issue":"3","key":"2024082915322043600_i1558-7959-32-3-53-Beneish1","doi-asserted-by":"crossref","first-page":"665","DOI":"10.2308\/accr.2008.83.3.665","article-title":"Internal control weaknesses and information uncertainty","volume":"83","author":"Beneish","year":"2008","journal-title":"The Accounting Review"},{"issue":"1","key":"2024082915322043600_i1558-7959-32-3-53-Canada1","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1108\/18347640910967753","article-title":"The pervasive nature of IT controls: An examination of material weaknesses in IT controls and audit fees","volume":"17","author":"Canada","year":"2009","journal-title":"International Journal of Accounting and Information Management"},{"issue":"3","key":"2024082915322043600_i1558-7959-32-3-53-Cao1","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1016\/j.accinf.2010.07.010","article-title":"Analyzing late SEC filings for differential impacts of IS and accounting issues","volume":"11","author":"Cao","year":"2010","journal-title":"International Journal of Accounting Information Systems"},{"issue":"2","key":"2024082915322043600_i1558-7959-32-3-53-Chan1","doi-asserted-by":"crossref","first-page":"161","DOI":"10.2308\/aud.2008.27.2.161","article-title":"Earnings management of firms reporting material internal control weaknesses under Section 404 of the Sarbanes-Oxley Act","volume":"27","author":"Chan","year":"2008","journal-title":"Auditing: A Journal of Practice & Theory"},{"issue":"1","key":"2024082915322043600_i1558-7959-32-3-53-Chan2","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1108\/18347640910967735","article-title":"The impact of Sarbanes-Oxley on internal control remediation","volume":"17","author":"Chan","year":"2009","journal-title":"International Journal of Accounting and Information Management"},{"key":"2024082915322043600_i1558-7959-32-3-53-CommitteeofSponsoringOrganizationsoftheTreadwayCommissionCOSO1","unstructured":"Committee of Sponsoring Organizations of the Treadway Commission (COSO). 2013. Internal Control\u2014Integrated Framework. Available at: https:\/\/www.coso.org\/Documents\/990025P-Executive-Summary-final-may20.pdf"},{"key":"2024082915322043600_i1558-7959-32-3-53-ComputerSecurityInstituteCSI1","unstructured":"Computer Security Institute (CSI). 2004. CSI\/FBI Computer Crime and Security Survey. Available at: http:\/\/dls.virginia.gov\/commission\/pdf\/2004%20CSI-FBI%20Computer%20Crime%20and%20Security%20Survey.pdf"},{"key":"2024082915322043600_i1558-7959-32-3-53-ComputerSecurityInstituteCSI2","unstructured":"Computer Security Institute (CSI). 2006. Virus Attacks Named Leading Culprit of Financial Loss by U.S. Companies in 2006 CSI\/FBI Computer Crime and Security Survey. Available at: http:\/\/i.cmpnet.com\/gocsi\/db_area\/pdfs\/fbi\/FBI2006.pdf"},{"issue":"1","key":"2024082915322043600_i1558-7959-32-3-53-DavisFriday1","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1108\/eb026979","article-title":"What managers should know about earnings management: Its prevalence, legality, ethicality, and does it work?","volume":"1","author":"Davis-Friday","year":"2002","journal-title":"Review of Accounting and Finance"},{"issue":"2","key":"2024082915322043600_i1558-7959-32-3-53-Dechow1","first-page":"193","article-title":"Detecting earnings management","volume":"70","author":"Dechow","year":"1995","journal-title":"The Accounting Review"},{"issue":"5","key":"2024082915322043600_i1558-7959-32-3-53-Doyle1","doi-asserted-by":"crossref","first-page":"1141","DOI":"10.2308\/accr.2007.82.5.1141","article-title":"Accruals quality and internal control over financial reporting","volume":"82","author":"Doyle","year":"2007","journal-title":"The Accounting Review"},{"issue":"1\/2","key":"2024082915322043600_i1558-7959-32-3-53-Doyle2","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1016\/j.jacceco.2006.10.003","article-title":"Determinants of weaknesses in internal control over financial reporting","volume":"44","author":"Doyle","year":"2007","journal-title":"Journal of Accounting & Economics"},{"issue":"2","key":"2024082915322043600_i1558-7959-32-3-53-Ettredge1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2308\/aud.2006.25.2.1","article-title":"The impact of SOX Section 404 internal control quality assessment on audit delay in the SOX era","volume":"25","author":"Ettredge","year":"2006","journal-title":"Auditing: A Journal of Practice & Theory"},{"key":"2024082915322043600_i1558-7959-32-3-53-Gaudin1","unstructured":"Gaudin, S. \n          \n          2007. Estimates Put T.J. Maxx Security Fiasco at $4.5 Billion. Available at: https:\/\/www.informationweek.com\/estimates-put-tj-maxx-security-fiasco-at-$45-billion\/d\/d-id\/1054704"},{"issue":"3","key":"2024082915322043600_i1558-7959-32-3-53-Ge1","doi-asserted-by":"crossref","first-page":"137","DOI":"10.2308\/acch.2005.19.3.137","article-title":"The disclosure of material weaknesses in internal control after the Sarbanes-Oxley Act","volume":"19","author":"Ge","year":"2005","journal-title":"Accounting Horizons"},{"issue":"8","key":"2024082915322043600_i1558-7959-32-3-53-Grant1","doi-asserted-by":"crossref","first-page":"803","DOI":"10.1108\/02686900810899536","article-title":"The effect of IT controls on financial reporting","volume":"23","author":"Grant","year":"2008","journal-title":"Managerial Auditing Journal"},{"issue":"1","key":"2024082915322043600_i1558-7959-32-3-53-Hammersley1","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1007\/s11142-007-9046-z","article-title":"Market reactions to the disclosure of internal control weaknesses and to the characteristics of those weaknesses under Section 302 of the Sarbanes-Oxley Act of 2002","volume":"13","author":"Hammersley","year":"2008","journal-title":"Review of Accounting Studies"},{"issue":"1","key":"2024082915322043600_i1558-7959-32-3-53-Hoitash1","doi-asserted-by":"crossref","first-page":"105","DOI":"10.2308\/aud.2008.27.1.105","article-title":"Internal control quality and audit pricing under the Sarbanes-Oxley Act","volume":"27","author":"Hoitash","year":"2008","journal-title":"Auditing: A Journal of Practice & Theory"},{"key":"2024082915322043600_i1558-7959-32-3-53-InformationSystemsAuditandControlAssociationISACA1","unstructured":"Information Systems Audit and Control Association (ISACA). 2012. COBIT 5: A Business Framework for the Governance and Management of Enterprise IT. Rolling Meadows, IL: ISACA."},{"issue":"3","key":"2024082915322043600_i1558-7959-32-3-53-Johnson1","doi-asserted-by":"crossref","first-page":"910","DOI":"10.1111\/j.1911-3846.2011.01135.x","article-title":"Ethical evaluations of earnings management and its consequences","volume":"29","author":"Johnson","year":"2012","journal-title":"Contemporary Accounting Research"},{"issue":"2","key":"2024082915322043600_i1558-7959-32-3-53-Jones1","doi-asserted-by":"crossref","first-page":"193","DOI":"10.2307\/2491047","article-title":"Earnings management during import relief investigations","volume":"29","author":"Jones","year":"1991","journal-title":"Journal of Accounting Research"},{"issue":"4","key":"2024082915322043600_i1558-7959-32-3-53-Khanin1","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1108\/18347641211272713","article-title":"Regulatory risk, borderline legality, fraud and financial restatement","volume":"20","author":"Khanin","year":"2012","journal-title":"International Journal of Accounting and Information Management"},{"issue":"2","key":"2024082915322043600_i1558-7959-32-3-53-Klamm1","first-page":"1","article-title":"SOX 404 reported internal control weaknesses: A test of COSO framework components and information technology","volume":"23","author":"Klamm","year":"2009","journal-title":"Journal of Accounting Information Systems"},{"issue":"2","key":"2024082915322043600_i1558-7959-32-3-53-Klamm2","doi-asserted-by":"crossref","first-page":"307","DOI":"10.2308\/acch-10266","article-title":"Determinants of the persistence of internal control weaknesses","volume":"26","author":"Klamm","year":"2012","journal-title":"Accounting Horizons"},{"issue":"1","key":"2024082915322043600_i1558-7959-32-3-53-Kothari1","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1016\/j.jacceco.2004.11.002","article-title":"Performance matched discretionary accrual measures","volume":"39","author":"Kothari","year":"2005","journal-title":"Journal of Accounting & Economics"},{"issue":"3","key":"2024082915322043600_i1558-7959-32-3-53-Kuhn1","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1108\/IJAIM-12-2011-0042","article-title":"An examination of the relationship of IT control weakness to company financial performance and health","volume":"21","author":"Kuhn","year":"2013","journal-title":"International Journal of Accounting and Information Management"},{"issue":"1","key":"2024082915322043600_i1558-7959-32-3-53-Li1","doi-asserted-by":"crossref","first-page":"179","DOI":"10.2307\/41410413","article-title":"The consequences of information technology control weaknesses on management information systems: The case of Sarbanes-Oxley internal control reports","volume":"36","author":"Li","year":"2012","journal-title":"MIS Quarterly"},{"key":"2024082915322043600_i1558-7959-32-3-53-LoudeyeCorp1","unstructured":"Loudeye Corp. 2004. Form 10-K. Available at: https:\/\/www.sec.gov\/Archives\/edgar\/data\/1064648\/000095012405002138\/v06074e10vk.htm"},{"issue":"3","key":"2024082915322043600_i1558-7959-32-3-53-Martin1","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1080\/10580530903017484","article-title":"Evaluating the financial performance of business method patent owners","volume":"26","author":"Martin","year":"2009","journal-title":"Information Systems Management"},{"key":"2024082915322043600_i1558-7959-32-3-53-MassachusettsBankersAssociation1","unstructured":"Massachusetts Bankers Association. 2007. Connecticut Bankers Associations and the Maine Association of Community Banks and Individual Banks File Class Action Lawsuit against TJX Companies Inc. Boston, MA: Massachusetts Bankers Association. Available at: https:\/\/www.businesswire.com\/news\/home\/20070424006308\/en\/Massachusetts-Connecticut-Bankers-Associations-Maine-Association-Community"},{"issue":"1","key":"2024082915322043600_i1558-7959-32-3-53-Merchant1","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1016\/0278-4254(94)90013-2","article-title":"The ethics of managing earnings: An empirical investigation","volume":"13","author":"Merchant","year":"1994","journal-title":"Journal of Accounting and Public Policy"},{"issue":"5","key":"2024082915322043600_i1558-7959-32-3-53-Ogneva1","doi-asserted-by":"crossref","first-page":"1255","DOI":"10.2308\/accr.2007.82.5.1255","article-title":"Internal control weakness and cost of equity: Evidence from SOX Section 404 disclosures","volume":"82","author":"Ogneva","year":"2007","journal-title":"The Accounting Review"},{"key":"2024082915322043600_i1558-7959-32-3-53-PricewaterhouseCoopersPwC1","unstructured":"PricewaterhouseCoopers (PwC). 2004. Integrity Driven Performance. Available at: https:\/\/docplayer.net\/9573578-Integrity-driven-performance.html"},{"key":"2024082915322043600_i1558-7959-32-3-53-PricewaterhouseCoopersPwC2","unstructured":"PricewaterhouseCoopers (PwC). 2015. U.S. Cybersecurity: Progress Stalled. Key Findings from the 2015 State of Cybercrime Survey. Available at: https:\/\/www.pwc.com\/us\/en\/increasing-it-effectiveness\/publications\/us-cybercrime-survey-2015.html"},{"key":"2024082915322043600_i1558-7959-32-3-53-PublicCompanyAccountingOversightBoardPCAOB1","article-title":"An Audit of Internal Control Over Financial Reporting That Is Integrated with An Audit of Financial Statements","volume":"5","author":"Public Company Accounting Oversight Board (PCAOB)","year":"2007","journal-title":"Auditing Standard No"},{"issue":"1","key":"2024082915322043600_i1558-7959-32-3-53-Raghunandan1","doi-asserted-by":"crossref","first-page":"99","DOI":"10.2308\/aud.2006.25.1.99","article-title":"SOX Section 404 material weakness disclosures and audit fees","volume":"25","author":"Raghunandan","year":"2006","journal-title":"Auditing: A Journal of Practice & Theory"},{"key":"2024082915322043600_i1558-7959-32-3-53-Ronen1","unstructured":"Ronen, J., and V. Yaari. \n          2008. Earnings Management: Emerging Insights in Theory, Practice, and Research. New York, NY: Springer."},{"issue":"8","key":"2024082915322043600_i1558-7959-32-3-53-Rubino1","doi-asserted-by":"crossref","first-page":"736","DOI":"10.1108\/MAJ-03-2014-1016","article-title":"Internal control over financial reporting: Opportunities using the COBIT framework","volume":"29","author":"Rubino","year":"2014","journal-title":"Managerial Auditing Journal"},{"key":"2024082915322043600_i1558-7959-32-3-53-SkilledHealthcareGroupInc1","unstructured":"Skilled Healthcare Group, Inc. 2009. Amendment to Form 10-K. Available at: https:\/\/www.sec.gov\/Archives\/edgar\/data\/1351051\/000095012309018738\/a53018e10vkza.htm"},{"key":"2024082915322043600_i1558-7959-32-3-53-Teppler1","unstructured":"Teppler, S. W. \n          \n          2007. T.J. Maxx and Identity Theft: The Never-Ending Story. (December 15). Available at: https:\/\/www.nysscpa.org\/news\/publications\/the-trusted-professional\/the-trusted-professional-archives\/page\/2"},{"key":"2024082915322043600_i1558-7959-32-3-53-Weill1","unstructured":"Weill, P., and J. W. Ross. \n          2005. How Effective Is Your IT Governance. Cambridge, MA: Center for Information Systems Research."},{"issue":"3","key":"2024082915322043600_i1558-7959-32-3-53-Zhang1","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1016\/j.jaccpubpol.2007.03.001","article-title":"Audit committee quality, auditor independence, and internal control weaknesses","volume":"26","author":"Zhang","year":"2007","journal-title":"Journal of Accounting and Public Policy"},{"issue":"Supplement","key":"2024082915322043600_i1558-7959-32-3-53-Zmijewski1","doi-asserted-by":"crossref","first-page":"59","DOI":"10.2307\/2490859","article-title":"Methodological issues related to the estimation of financial distress prediction models","volume":"22","author":"Zmijewski","year":"1984","journal-title":"Journal of Accounting Research"}],"container-title":["Journal of Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/publications.aaahq.org\/jis\/article-pdf\/32\/3\/53\/9281\/isys-51884.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/publications.aaahq.org\/jis\/article-pdf\/32\/3\/53\/9281\/isys-51884.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T17:12:26Z","timestamp":1724951546000},"score":1,"resource":{"primary":{"URL":"https:\/\/publications.aaahq.org\/jis\/article\/32\/3\/53\/1138\/The-Association-between-IT-Material-Weaknesses-and"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,1]]},"references-count":47,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2017,8,1]]},"published-print":{"date-parts":[[2018,9,1]]}},"URL":"https:\/\/doi.org\/10.2308\/isys-51884","relation":{},"ISSN":["1558-7959","0888-7985"],"issn-type":[{"type":"electronic","value":"1558-7959"},{"type":"print","value":"0888-7985"}],"subject":[],"published":{"date-parts":[[2017,8,1]]}}}