2013
DOI: 10.1016/j.accinf.2011.11.002
|View full text |Cite
|
Sign up to set email alerts
|

A content analysis of auditors' reports on IT internal control weaknesses: The comparative advantages of an automated approach to control weakness identification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 45 publications
(12 citation statements)
references
References 20 publications
0
12
0
Order By: Relevance
“…Huang and Li () identified 25 types of risk factors from 10‐Ks, using a ‘text classification algorithm called the multi‐label categorical K ‐nearest neighbor (ML‐CKNN)’, which calculated a ‘categorical similarity score for each label’, achieving 74.94% accuracy. Boritz et al () applied quadratic discriminant analysis, demonstrating the value of ‘advanced searching capabilities, dictionary building tools, and visualization tools, including dendrograms in S+ (from HAC), divisive clustering, and concept maps’. This allowed the team to produce a validated term dictionary, categorizing 387 Sarbanes Oxley Act of 2002 (SOX) Section 404 reports into 14 categories of risk associated with IT weaknesses (Boritz et al, ).…”
Section: Classificationmentioning
confidence: 99%
See 2 more Smart Citations
“…Huang and Li () identified 25 types of risk factors from 10‐Ks, using a ‘text classification algorithm called the multi‐label categorical K ‐nearest neighbor (ML‐CKNN)’, which calculated a ‘categorical similarity score for each label’, achieving 74.94% accuracy. Boritz et al () applied quadratic discriminant analysis, demonstrating the value of ‘advanced searching capabilities, dictionary building tools, and visualization tools, including dendrograms in S+ (from HAC), divisive clustering, and concept maps’. This allowed the team to produce a validated term dictionary, categorizing 387 Sarbanes Oxley Act of 2002 (SOX) Section 404 reports into 14 categories of risk associated with IT weaknesses (Boritz et al, ).…”
Section: Classificationmentioning
confidence: 99%
“…Boritz et al () applied quadratic discriminant analysis, demonstrating the value of ‘advanced searching capabilities, dictionary building tools, and visualization tools, including dendrograms in S+ (from HAC), divisive clustering, and concept maps’. This allowed the team to produce a validated term dictionary, categorizing 387 Sarbanes Oxley Act of 2002 (SOX) Section 404 reports into 14 categories of risk associated with IT weaknesses (Boritz et al, ). Malo et al () used an LPS model (‘a hybrid of rule‐based linguistic models and machine‐learning techniques’) and a multi‐class SVM algorithm to analyse the semantic tone of debt disclosures in 10,000 financial news articles, generating a lexicon of finance phrases and a general model to assess the ‘semantic orientations’ (positive, negative or neutral sentiment) of finance‐related narratives.…”
Section: Classificationmentioning
confidence: 99%
See 1 more Smart Citation
“…This inconsistency between the provided frameworks and legal requirements for organizations inherently leads to various interpretations of the term in both the academic and the professional literature (Holm and Laursen 2007). Such inconsistency also leads to a potential problem for the user of the internal control reports, such as when trying to link the terminology that is used in auditors' reports back to that which is used in the professional literature or published guidelines and standards (Boritz et al 2013). The management control literature tends to understand the term as a 'narrower scope definition of management control' or the process of 'strategy implementation' (Merchant and Otley 2007) and thereby sees internal control as a basis of information that feeds into both the strategic control (external focus) and the management control (internal focus) systems of an organization (Pfister 2009).…”
Section: Introductionmentioning
confidence: 99%
“…In fact, the IT Governance Institute (ITGI) repeatedly addresses this issue by stating that the reliability of the financial reporting system is dependent on a "well-controlled IT environment" (ITGI, 2004). Given that ITMWs (typically) include weaknesses in access, monitoring, design issues, change and development, end-user computing, segregation of duties, policies, documentation, master files, backup, staffing sufficiency and competency, security, outsourcing and operations (Boritz et al, 2013), ITMWs are likely to have a negative impact on the reliability on financial reporting. Furthermore, recent work highlights that IT is the foundation of an effective system of internal controls, and firms that are proactive in the adoption of IT within internal controls are less likely to have material weaknesses in their internal controls (ITGI, 2004;Hunton et al, 2008;Masli et al, 2010).…”
Section: Prior Literature and Hypothesis Developmentmentioning
confidence: 99%