Posts

Posts

  • Richard E Lillie
    Competency-based education is all the rage: What is it?9
    blog entry posted April 7, 2015 by Richard E Lillie, tagged research, teaching in Teaching with Technology > TwT public

    In his blog "OLDaily," Stephen Downes referenced an article published in The Tennessean (4/07/2015) titled Competency-based education is all the rage:  What is it?  The article was written by Kimberly K. Estep, Chancellor of WGU Tennessee (Western Governors University).

     

    Estep provides a great definition of competency-based education (CBE).  She provides an interesting example of how CBE works at WGU Tennessee.

     

    I'm interested in finding out whether your college or university has adopted any type of CBE programs, particularly for accounting.  If you have adopted a CBE for accounting or are considering doing this, please REPLY to this posting telling us about the program.

     

    Best wishes,

     

    Rick Lillie

     

    Rick Lillie, MAS, Ed.D., CPA (Retired)

    Associate Professor of Accounting, Emeritus

    CSUSB, CBPA, Department of Accounting & Finance

    5500 University Parkway, JB-547

    San Bernardino, CA.  92407-2397

     

    Email:  rlillie@csusb.edu

    Telephone:  (909) 537-5726

    Skype (Username):  ricklillie

     

     

    Recent Comments (3 of 9)

  • Richard E Lillie
    Emerging Technologies in Distance Education -- Outstanding...106
    blog entry last edited May 22, 2012 by Richard E Lillie, tagged research in Teaching with Technology > TwT public

    In July, 2010 AU Press (Athabasca University, Canada) published a book that I think you will find is an excellent resource for ideas about using technology in teaching and learning.  The book entitled Emerging Technologies in Distance Education is edited by George Veletsianos.

    AU Press makes the book available for free in Adobe Acrobat (.pdf) format.  You may download the entire publication or selected chapters.

    This book is worth exploring.  It may not turn you into a "pro from Dover" (to draw on the line from the movie Mash).  However, it should help you better understand how to use technology when you design course materials and share them with your students.

    Enjoy.

    Rick Lillie (Cal State, San Bernardino)

    Emerging Technologies in Distance Education

    Recent Comments (3 of 106)

  • Roger S Debreceny
    Forthcoming paper: Blogs as Research and Teaching Resources...2
    blog entry last edited March 18, 2016 by Roger S Debreceny, tagged research, teaching in JIS Senior Editors' Blog public

    A forthcoming paper in JIS from Dr Glen Gray, California State University at Northridge, is entitled  Blogs as Research and Teaching Resources for Accounting Academics. So this is a blog about blogs!

    Glen Gray

    Dr Glen Gray

    If William Shakespeare was writing about blogs today, he would say something like "What’s in a name? A blog by any other name would still be just as sweet." Blogs are definitely a sweet source of timely information on a wide variety of topics for accounting- and AIS-related research and teaching. However, there is no absolute definition of blogs that can be used to determine whether a website is a blog or not. Blog is a label that a web master can give to his/her website or not. As working definition, a blog is a website where an individual (a blogger) or a group of individuals post observations and opinions regarding a specific topic and usually where readers can post comments. There is probably thousands of useful website that meet this definition but are not called blogs by the webmasters. Under this broad definition of blogs, social media (Facebook, Twitter, etc.) are blogs.

    Potentially useful blogs (and blog equivalents) are maintained by academics (inside and outside of the accounting domain), practitioners, large and small accounting firms, and accounting and technology vendors. The primary value of blogs is their immediacy because bloggers are very quick to post blogs regarding any events (new regulations, new lawsuits, new technologies, etc.) in the subject matter they are following. Bloggers archive their previous posts; accordingly, besides being very timely, blogs can also provide a rich history of specific subject matters. However, quoting the movie, How the Grinch Stole Christmas, “One man’s compost is another man’s potpourri.”  Blogs are not vetted or subject to independent review, consequently it’s caveat emptor when venturing into the blogosphere to collect information.  

    With that caution stated, different bloggers’ opinions—biased or not—on a specific topic or subject matter can be a valuable starting point or input for more rigorous research. These opinions can be transformed into testable hypothesis and subsequently accepted or rejected.

    These different bloggers’ opinions can also be a valuable teaching resource. Students can be assigned to locate several blogs on a specific topic, summarize differences found, and develop conclusions based on their review of the blogs and a rational for reaching those conclusions.

    The challenge is that locating applicable blogs is a messy and arbitrary process. Search of BlogSearchEngine.org (a Google app) on the term “accounting” returns 32 million results! Fortunately, the top listed accounting blogs are frequently lists of blogs (e.g. 50 Accounting Blogs You Should Follow at blog.directcapital.com).  In addition to traditional web searches (e.g., google.com), there are specialized blog directories that provide another method to locate blogs. One place to start is 23 Blog Directories to Submit Your Blog To (www.searchenginejournal.com/20-essential-blog-directories-to-submit-your-blog-to).

    To completely realize the value of blogs, you should also search for websites that have all the characteristics of blogs, but are not labeled blogs. For example, in addition to specifically labeled blogs, both large and small accounting firms publish newsletters, alerts, and perspectives that have all of the characteristics blogs. These blog-equivalents cover a wide variety of topics and be included in any search for blogs for research or teaching.

    Recent Comments (2 of 2)

  • Edith Orenstein
    COSO Publishes Exposure Draft Updating 1992 Internal Control...13
    blog entry last edited April 17, 2012 by Edith Orenstein, tagged research, teaching in Edith Orenstein's Member Blog public

    On Dec. 19, 2011 the Commitee of Sponsoring Organizations of the Treadway Commission, whose founding members are the AAA, AICPA, FEI, IIA and IMA, announced the release of an Exposure Draft updating COSO's 1992 Internal Control-Integrated Framework (IC-IF). Why should you care? Why should your students care?

    For the past 20 years, COSO's IC-IF has been the 'gold standard' as a principles-based framework for internal control, particularly internal control over financial reporting, as evidenced by the reference to COSO in the SEC's and PCAOB's rulemaking requiring management reports, and an auditor's report, on the effectiveness of internal control over financial reporting.

    Input from constituents of all five of COSO's sponsoring organizations, and other stakeholders, is highly sought to help make the resulting revision of COSO's general IC-IF, and the related Guidance on Internal Control over External Financial Reporting (ICEFR) - to be released as a separate Exposure Draft in the Spring of 2012, more practical, and more sensible from a theoretical/principles based focus as well.

    COSO's framework is a tool which students in the field of financial reporting and beyond should be familiar with as they enter the business world.

    The comment deadline on the Exposure Draft for the update to COSO's IC-IF is March 31, 2012. Read more about COSO's ED in the FEI FInancial Reporting Blog, and keep up with the latest developments by visiting COSO's website, www.coso.org."

    By the way, FEI recently launched a second blog, authored by Tom Thompson of our research affiliate, the Financial Executives Research Foundation (FERF). Learn more about the FERF research blog.

    Recent Comments (3 of 13)

  • Gia M Chevis
    Nominate an outstanding new researcher!
    blog entry posted September 2, 2016 by Gia M Chevis, tagged international, research in The Forum--The Blog of the International Section public

    It's time for nominations for the 2017 Outstanding International Accounting Dissertation Award!  See the call for nominations below and get your submission to Bowe Hansen before 25 February!

    2017 Outstanding International Accounting Dissertation Award

    The International Accounting Section of the American Accounting Association invites submissions for its Outstanding International Accounting Dissertation Award, to be presented at the Annual Meeting of the American Accounting Association in San Diego, CA during August 2017.

    All doctoral dissertations successfully defended during the 2016 calendar year in all areas of international accounting — including topics in financial, managerial, auditing, taxation, and information systems — are eligible for this award. Eligible individuals should e-mail the following materials no later than (and preferably earlier than) February 25, 2017:

    1. Summary of the dissertation not exceeding 20 pages including tables, or a working paper based on their dissertation, and
    2. A letter of support from his/her dissertation committee chairperson.

    Upon reviewing the initial submission materials, the Outstanding Dissertation Award Committee will select finalists for the award. Finalists will be requested to submit copies of the complete dissertation to the committee.

    The committee will be grateful to receive suggestions from section members for suitable candidates for this award. Please let all the faculty and PhD students at your school be aware of the award.

    Please send submissions via email to:

    Bowe Hansen
    Pamplin College of Business – Virginia Tech

    bowe.hansen@vt.edu
     

    The DEADLINE for nominations is February 25, 2017.

     

    Winners of the Outstanding International Accounting Dissertation Award to date are:
    1984 Trevor J. Harris, University of Washington
    1985 (none awarded)
    1986 Betty C. Brown, University of Louisville
    1987 Shahrokh M. Saudagaran, University of Washington
    1988 David Sharp, Massachusetts Institute of Technology
    1989 Teresa L. Conover, University of North Texas
    1990 F. Norman Shiue, George Washington University
    1991 Ajay Adhikari, Virginia Commonwealth University
    1992 Stephen B. Salter, University of South Carolina
    1993 Patricia McQueen, New York University
    1994 Keith R. Duncan, Bond University
    1995 Mary A. Flanigan, Virginia Commonwealth University
    1996 Wayne Thomas, Oklahoma State University
    1997 Paquita Y. Davis-Friday, University of Michigan
    1998 Karl Albert Muller III, University of Illinois Urbana-Champaign
    1999 Jan Marton, Göteborg University
    2000 Tracy Manly, University of Arkansas
    2001 Takashi Yaekura, University of Illinois Urbana-Champaign
    2002 Ole-Kristian Hope, Northwestern University
    2003 Thomas A. Matthews, University of Waterloo
    2004 Steven Francis Orpurt, University of Chicago
    2005 Christopher Hodgdon, Virginia Commonwealth University
    2006 Etty Retno Wulandari, Nanyang Business School
    2007 Annelies Renders, Katholieke Universiteit
    2008 Devan Mescall, University of Waterloo
    2009 Hans Christensen, University of Manchester
    2010 Lijie Yao, Tsinghua University
    2011 Gwen Yu, University of Michigan
    2012 Clare Wang, Northwestern University
    2013 Roger Silvers, University of Massachusetts Amherst
    2014 Lisa De Simone, University of Texas
    2015 Hsiao-Tang Hsu, Temple University

    2016 Giulia Giunti, Umeå University

  • Roger Debreceny
    JIS Conference 2016
    blog entry posted August 26, 2016 by Roger Debreceny, tagged research, teaching in JIS Senior Editors' Blog public

    The planning for the 2016 JIS conference is well advanced. It will be held at the offices of Workday, Inc. on October 13 & 14.  There will be a keynote address from Mark Nittler, Vice President , Enterprise Strategy, Workday, Inc on Big Data and Analytics and their relation to accounting and finance, three panels and five academic papers. A very limited number of places is available for professionals to attend the conference. The enclosed information packet has the program and administrative details. 

  • Roger S Debreceny
    In a sea of Big Data, what becomes of accounting and...
    blog entry last edited March 23, 2016 by Roger S Debreceny, tagged research in JIS Senior Editors' Blog public

    Dr A. Faye Borthick at Georgia State University is the co-chair of  JISC2016 - 2nd Journal of Information Systems Research Conference, to be held at the offices of Workday, Inc., Pleasanton, CA on October 13 &14. The theme of the conference is An Accounting Information Systems Perspective on Data Analytics and Big Data

    In this commentary, Dr Borthick sets out some of the issues that are relevant for the conference.

     

    Dr A. Faye Borthick

    Dr A. Faye Borthick

    In a sea of Big Data, what becomes of accounting and auditing?
    A. Faye Borthick

    Evolution of Big Data and Its Insinuation in Organizations

    Big Data and the software for doing interesting things with the data have developed far enough that some trends have emerged. People are clever. Leave them alone with resources, and they will do interesting things with them, giving both intended and unintended consequences. This commentary highlights the landscape of Big Data, not the technical aspects per se but how organizations are starting to use data in different ways. While it is true that some of what this commentary offers does not, strictly speaking, require Big Data with respect to volume, diversity, and structure, the connotations that Big Data bestowed have prompted new ways to stage and use data. For example, “70% of firms now say that big data is of critical importance to their firms” (Malone 2016 A17).

    We invite you to reflect on burgeoning data and its emerging uses highlighted below as you consider innovative practice on aspects related to data analytics and Big Data.

    Accounting

    Managers and investors are tantalized by the prospects of using more data to make companies more profitable and to make organizations more responsive to their constituents (Dwoskin 2014). The growing number of fintech company startups making loans based only on digital data illustrates the phenomenon (Rudegeair 2015). Furthermore, ideas about how to take advantage of data can come from anywhere. This is the phenomenon that propels startup companies into billion dollar IPOs (initial public offerings of stock) in just a few years.

    With new insights into consumer/buyer behavior and product performance, companies and organizations have been compelled to accelerate changes to their business processes to stay current with their product and service offerings (Zetlin 2015). Instead of weeks, General Motors’ profitability analysis of the Chevrolet brand in Europe took only days (Monga 2014). Food companies have noticed declines in sales of the worst offenders of packaged foods associated with packing on the pounds (Esterl 2016) or foods containing GMOs (Brat 2015). How fast can packaged food makers adjust to such a shift? When Ben & Jerry’s set out to source only organic products for its ice cream, it discovered that a key ingredient, organic milk, was not available in sufficient quantity for its volume (Gasparro 2014). The company is caught between consumers whose tastes change rapidly and a supply chain that requires years to evolve.

    Much though companies aspire to change their information systems to take advantage of the business insights that analysis of data can afford, they are hindered by existing systems that have accreted over decades. The bigger and older the company, typically the more systems a company has and the less they are integrated. For example, General Electric hired Amazon to help it “reduce internal applications to 5,000 from more than 9,000 and move them to Amazon and other cloud services,” in order to “allow GE to eliminate 30 of its 34 worldwide data centers and roll out new applications in as little as five minutes” (McMillan and Barr 2015 B5). Other companies such as Whole Foods Market Inc. and Wal-Mart Stores Inc. are “plowing into years-long efforts to merge disparate data sets, in the hope of extracting cost savings and insights about customers” (Norton 2015 B4).

    Where do the data come from that companies and organizations want to analyze? Some of it is the familiar transaction data in accounting systems, usually highly structured with careful editing before it is permitted to enter the accounting system. Some of the data is about the location or behavior of things, e.g., RFID (radio frequency ID) data, recorded in real time indicating the existence of products or pallets of products in a specific location at a specific time. These data are usually highly structured. Then come the unstructured data of interactions, often from social media, whose existence has spawned whole new categories of analysis.

    Lest one think that these data capabilities are only available to large companies, consider the experience of some startups in which middle management has been subsumed in data. Instead of hiring people to get the data needed for decisions (the traditional middle management role), the startups make extensive data dashboards available to everyone in the company. Middle managers are not needed to gather information and make decisions because “every employee can have the tools to monitor progress toward any goal” (Mims 2015). The transparency and accountability afforded by all-employee access to dashboards means that leaders can find out how the business is performing directly without relying on middle management.

    Where do the data live? More and more in the cloud, of course, with a dashboard interface most likely designed by the cloud-services provider or a consultant. This approach arose first in startups because it allowed them to run lean, minimizing headcount. Big companies can move to dashboards, but the costs of taming non-integrated systems loom large, and corporate cultures will have to be transformed. Big companies with their non-integrated legacy systems realize that time is of the essence because startup companies commence operations with fully integrated systems run from the cloud (Ismail et al. 2014; Loten 2015).

    What are the implications for employment of the people that now summarize, categorize, and report data? Merchandising staff are discovering that management wants to rely more on data analysis than instinct for product selection, much to the dismay of chief merchants, “once lionized for their knack for spotting trends, are finding their intuitions being displaced by algorithms” (Kapner 2015 B7). Floor stock traders have been replaced with software, and now financial analysts are being replaced with software (Popper 2016).

    Where is the accountant in this uncharted sea? Because accountants understand traditional accounting data, they are uniquely poised to analyze it, including the related location and interaction data. As more accounting functions are automated in software, managers and investors are expecting higher levels of analysis of all the data. Investors are eager to spot business trends that portend changes in revenue. Thus, they are interested in feeds of transaction data, e.g., summaries by day of consumer purchases at publicly traded companies . The transactions are captured in the normal course of business but become useful for non-transaction purposes, a strategy known as cashing in on “exhaust, ” i.e., “data collected while doing other business” (Hope 2015).

    Auditing

    What happens to auditing when data volumes grow, when data about interactions and observations become available in addition to the traditional transaction data? Transaction data are typically well structured, which makes them amenable to analysis in relational database systems. Interaction data, e.g., from social media or other sources, are typically unstructured. Data about observations may be structured, e.g., RFID data or logs containing process events, or unstructured depending on the context, e.g., comments appearing in logs of process events.

    Data proliferation challenges auditing because auditing has been formulated and conducted in a world in which data were limited and there were no good software tools for analyzing large volumes of data. But conditions are changing.

    Data limitations in auditing gave rise to sampling as a way to obtain evidence about account balances and flows. In the absence of data and computational software, auditors developed manual procedures based on sampling a small number of items (transactions usually) and checklists to ensure that lower level staff could execute audit procedures. But data limitations are falling away. When they know the whole population of data could be analyzed, people just laugh at the sampling mentality. Instead, they want data analytics applied to the whole population to make the data give up their secrets (Murphy and Tysiac 2015). This presents a problem to auditors in that they have decades invested in a sampling/checklist/procedural approach to auditing in a time when their constituents want data analytics applied to whole data populations. Eventually auditing standards premised on sampling will be revised to embrace better evidence (Titera 2013).

    As auditors have dived deeper into company data, the Public Company Accounting Oversight Board (PCAOB) has stepped up its scrutiny of auditors’ testing of system-generated data and reports as a means of prompting auditors to detect more of the latent internal control deficiencies. In essence, the PCAOB is demanding that auditors vouch for controls over “the accuracy and completeness of the system-generated data or reports” (Munter 2015). Thus, even as auditors are facing more data, they are being pressed to detect deficiencies in internal control over the data on which they rely for evidence.

    Accounting firms are taking advantage of growing data availability and increasing software capabilities to create dashboards populated with operating and other related data streams (PwC 2015). The purpose of the dashboards is twofold: to facilitate auditors thinking analytically about risks and their instantiation in data patterns and to enable drilling down through the data to look for underlying causes for anomalies or for business opportunities. This approach can be called an analytics mindset.

    Auditors are shifting from a sampling mentality to a data analytics approach as a competitive necessity. Their investments to reorient audit methodologies are large, in developing auditing based in analytics, retraining staff, and seeking and cultivating an analytic mindset in new staff.

    Education

    The ripple effect of Big Data on university level education for accountants comes through calls from employers for entry-level accountants and auditors with analytical skill sets. The business press has documented the shift from armies of people tracking and paying for orders to automation of the task (Monga 2015). “Since 2004, the median number of full-time employees in the finance department of big companies has declined 40% to about 71 people for every $1 billion of revenue” (Monga 2015).

    If manual entries, which used to require armies of people, have been automated, what skills do entry-level accountants need? A typical response usually includes a variant of “analyze data and present findings coherently to colleagues “ (Johnson 2015). The data analytics response has been written into AACSB Standards for Accounting in the form of Standard A7 on data analytics (AACSB 2013).

    References

    AACSB. 2013. Eligibility Procedures and Accreditation Standards for Accounting Accreditation Standard A7. Tampa, FL: Association to Advance Collegiate School of Business. Accessed March 30, 2014: http://www.aacsb.edu/accreditation/standards/2013-accounting/Learning%20and%20Teaching%20Standards/standard7.aspx.

    Brat, I. 2015. Food goes 'GMO free' with same ingredients. The Wall Street Journal, B1 (August 21).

    Dwoskin, E. 2014. Tons of data. Now put it to use. The Wall Street Journal, R6 (October 20).

    Esterl, M. 2016. As sales fizzle, pop makers bill more for a sip. The Wall Street Journal, B1 (January 28).

    Gasparro, A. 2014. How we eat: GMO fight ripples down food chain. The Wall Street Journal, A1 (August 8).

    Hope, B. 2015. Firm tracks cards, sells data. The Wall Street Journal, A1 (August 7).

    Ismail, S., M. S. Malone, and Y. Van Geest. 2014. Exponential Organizations: Why New Organizations Are Ten times Better, Faster, and Cheaper Than Yours (and What To Do About It). New York, NY: Diversionbooks.

    Johnson, K. S. 2015. Outdated: The plain-vanilla accountant. B7 (May 19).

    Kapner, S. 2015. Data pushes aside chief merchants. The Wall Street Journal, September 23, B7  (September 23).

    Loten, A. 2015. Cloud tools tackle new tasks. The Wall Street Journal, B6 (June 4).

    Malone, M. S. 2016. The Big-Data future has arrived. The Wall Street Journal, A17 (February 23).

    McMillan, R., and A. Barr. 2015. Google taps director for cloud push. The Wall Street Journal, B5 (December 24).

    Mims, C. 2015. Data is now the new middle manager. The Wall Street Journal, April 20, B1, B2 (April 20).

    Monga, V. 2014. Big data chips away at cost. The Wall Street Journal, B6 (July 1).

    ———. 2015. The new bookkeeper is a robot. The Wall Street Journal, May 5, B1, B7 (May 5).

    Munter, H. A. 2015. Importance of audits of internal controls: Public Company Accounting Oversight Board (PCAOB). September 9. Available at http://pcaobus.org/News/Speech/Pages/Munter-Audits-Internal-Control-IAG-09092015.aspx. Accessed March 11, 2016.

    Murphy, M. L., and K. Tysiac. 2015. Data analytics helps auditors gain deep insight. Journal of Accountancy (April/May): 52-58.

    Norton, S. 2015. Big companies rein in data sprawl. The Wall Street Journal, B4 (October 22).

    Popper, N. 2016. The robots are coming for Wall Street. The New York Times, February 25. Available at http://www.nytimes.com/2016/02/28/magazine/the-robots-are-coming-for-wall-street.html?rref=collection%2Fsectioncollection%2Fmagazine&action=click&contentCollection=magazine&region=stream&module=stream_unit&version=latest&contentPlacement=9&pgtype=sectionfront. Accessed March 5, 2016.

    PwC. 2015. Data driven: What students need to succeed in a rapidly changing business world: PricewaterhouseCoopers LLP. Accessed May 31, 2015. http://www.pwc.com/us/en/faculty-resource/assets/PwC-Data-driven-paper-Feb2015.pdf.

    Rudegeair, P. 2015. Online firms seek to eat banks' lunch. The Wall Street Journal, C1 (June 29).

    Titera, W. R. 2013. Updating audit standard--enabling audit data analysis. Journal of Information Systems 27 (1): 325-331.

    Zetlin, M. 2015. Breaking free. CIO (October 1): 22-29.

     

  • Roger S Debreceny
    Forthcoming paper: Valuing Personal Data to Foster Privacy:...
    blog entry last edited March 23, 2016 by Roger S Debreceny, tagged research in JIS Senior Editors' Blog public

    An important new commentary in JIS from Juergen Sidgman and Malcolm Crompton is entitled "Valuing Personal Data to Foster Privacy: A Thought Experiment and Opportunities for Research." Juergen is Assistant Professor at the University of Wisconsin at Oshkosh. Malcolm is Managing Director of Information Integrity Solutions in Australia and Australia's Privacy Commissioner from 1999 to 2004.   

    Malcolm Crompton

    What if accounting standards changed to require corporations to determine and present the value of personal data on financial statements?

    We argue that in this, the information age, markets would be significantly better informed, valuations of corporations would change radically and that board and management focus would be markedly different.

    In a time when data is increasingly becoming the foundation for business success, the race to collect, analyze, and use large amounts of personal data has left largely unattended the privacy considerations of individuals from whom this data is obtained. As a consequence, individuals are left alone to deal with increased risks of identity theft, potential embarrassment and stigma, and potential civil rights violations.

    On the surface, organizations seem to lack real incentives to protect personal data. Individuals continuously provide personal data at no cost to governments and to businesses through interactions with social media, Internet searches, and possession of smart devices and other internet connected equipment. In addition, anecdotal evidence shows that when breaches in corporate security lead to data breaches the reputational damages encountered by the affected corporations have no long-term economic consequences.

    In this commentary, we make the case that absent formal mechanisms enabling corporations to determine and present the value of personal data on financial statements, privacy considerations will continue to be neglected. We acknowledge the difficulty of the task ahead exposing difficult questions such as: how can we assess and reassess the evolving future economic benefits that collected data has the potential to create? In light of these difficulties and the paucity of research in this area, we present research opportunities that are relevant to different fields in accounting.

    We also elaborate on how we expect data valuation to impact privacy through greater understanding of data, improved market efficiency, and more thorough oversight over management’s handling of data assets. Finally, we express that through data valuation, the accounting community has a unique opportunity to limit, not only improper data protection mechanisms that weaken privacy, but also the growing market consensus exposing the diminishing usefulness of financial reports.

    We acknowledge that before any change such as this could be contemplated in practice, significant advances in accounting theory and practice will be essential. We also argue that the extent to which markets are currently ill-informed means that the time to start is now.

  • Roger S Debreceny
    Forthcoming paper: Repairing Organizational Legitimacy...
    blog entry posted March 23, 2016 by Roger S Debreceny, tagged research in JIS Senior Editors' Blog public

    A forthcoming paper in JIS is "Repairing Organizational Legitimacy Following Information Technology (IT) Material Weaknesses: Executive Turnover, IT Expertise, and IT System Upgrades" authored by Jacob Z. Haislip, Adi Masli, Vernon J. Richardson and Juan Manuel Sanchez.

    Jacob Z. Haislip

    Adi Masli

    Vernon J. Richardson

    Juan Manuel Sanchez

    Information technology (IT) is of first-order importance regarding the financial systems’ ability to provide access to and security of accounting records, which ultimately affects financial reporting quality. COSO’s 2013 framework on internal controls highlights the importance of IT since reliance on evolving and new technologies continues to grow. Specifically, COSO’s 2013 framework lists selecting and developing controls over information technology as one of the pivotal internal control principles. Findings from extant research suggest that, relative to non-IT related internal control material weaknesses, IT-related material weaknesses (or IT material weaknesses) have a more negative impact to the effectiveness of internal controls, result in less reliable financial information, and generate consequences that are more adverse. Hence, the existence of IT material weaknesses presents a threat to the legitimacy of an organization. The objective of our research article is to examine how companies repair organizational legitimacy following information technology material weaknesses. We document that firms with IT material weaknesses, compared to firms with non-IT related material weaknesses, are more likely to replace outgoing CEOs, CFOs, and directors with individuals possessing IT expertise. In addition, IT material weakness firms are more likely to upgrade their financial reporting IT system and make other IT initiative changes, such as hiring an executive dedicated to the oversight and management of IT or adding a technology committee to the board. Moreover, we find evidence suggesting that IT material weakness firms that engage in major changes in their IT governance (i.e., those that replace their CFO with executives with IT expertise and/or upgrade the financial reporting system) are more likely to remediate their internal control weaknesses. Overall, firms recognize that IT control breakdowns represent a legitimate threat to the financial reporting environment and firms engage in various steps to restore organizational legitimacy.

  • Roger S Debreceny
    Forthcoming paper: The Effect of Frequency and Automation of...
    blog entry posted March 18, 2016 by Roger S Debreceny, tagged research in JIS Senior Editors' Blog public

    A forthcoming paper in JIS authored by Dr Maia Farkas at California State University, San Marcos and Dr Rina Hirsch from Hofstra University is entitled The Effect of Frequency and Automation of Internal Control Testing on External Auditor Reliance on the Internal Audit Function. Here is a summary of the paper.

     

    Maia Farkas

    Dr Maia Farkas

    Rina Hirsch

    Dr Rina Hirsch

     

     

    Over the last two decades, audits of publicly traded companies have become increasingly onerous and costly, in large part due to extensive control testing mandated by the Sarbanes-Oxley Act of 2002. For this reason, increasing audit efficiency has become more and more important. One way to improve audit efficiency is for the external auditor to rely on a strong internal audit function (IAF). Furthermore, management benefits from improved audit efficiency by way of lower audit fees, ensuring compliance with regulations, enhancing risk assessments, and ensuring the adequacy and functioning of internal controls.

     

    Using an experiment with experienced external auditors as participants, we examine a setting in which the external auditor identifies poor work performance by the IAF and management implements an internal control testing remediation strategy that varies on two characteristics: automation and frequency. The level of automation can vary from no automation (entirely manual) to complete automation (entirely information technology based). The frequency of internal control testing can vary from periodic testing to continuous testing. We investigate whether the following remediation strategies are effective in improving external auditors’ perceptions of IAF competence, work performance, and objectivity as well as subsequent reliance decision: automated controls testing conducted on a real-time basis (akin to continuous controls monitoring or CCM), automated controls testing conducted on a weekly basis (akin to Audit Command Language or ACL), and manual controls testing conducted by internal auditors on a weekly basis.

     

    Our results indicate that the frequency characteristic of the remediation strategies indeed affects external auditors’ perceptions of competence, work performance, and objectivity, while the automation characteristic of the internal control testing remediation strategies does not impact these perceptions of the strength of the IAF. Contrary to our expectations, external auditors appear to improve reliance on the IAF when the internal control testing is performed less frequently as opposed to more frequently. We suggest that management may not need to invest in expensive continuous controls monitoring technologies to improve reliance subsequent to a shortcoming in the IAF’s work performance if improved reliance (and hence lower audit fees) are its ultimate goal.

    Interestingly, all three remediation strategies are effective at improving assessments of the IAF’s poor work performance as well as external auditors’ reliance on the internal auditors. Thus, some benefit will accrue to management, regardless of the strategy employed. These results provide useful information to management, enabling them to maximize the benefits associated with having a higher quality IAF. Furthermore, our results are informative to standard setters that are interested in how external auditors assimilate information cues.