Next Article in Journal
Sustainability of Serbian Villages in COVID-19 Pandemic Conditions
Next Article in Special Issue
Environment, Social, and Governance Score and Value Added Impacts on Market Capitalization: A Sectoral-Based Approach
Previous Article in Journal
Mangrove Above-Ground Biomass and Carbon Stock in the Karimunjawa-Kemujan Islands Estimated from Unmanned Aerial Vehicle-Imagery
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Effect of Computer Assisted Audit Tools on Corporate Sustainability

by
António Samagaio
* and
Tiago Andrade Diogo
Advance/CSG, ISEG—Lisbon School of Economics & Management, Universidade de Lisboa, 1200-781 Lisbon, Portugal
*
Author to whom correspondence should be addressed.
Sustainability 2022, 14(2), 705; https://doi.org/10.3390/su14020705
Submission received: 30 November 2021 / Revised: 2 January 2022 / Accepted: 3 January 2022 / Published: 9 January 2022
(This article belongs to the Special Issue Sustainable Finance and Value Creation)

Abstract

:
The literature is fertile in studies that examine the determinants of internal and external auditors’ adoption of computer-assisted audit tools and techniques (CAATs), often ignoring their practical effects on audit quality and organizational performance. This study provides novel evidence on the type of CAATs used by internal auditors, tests the effect of their adoption on corporate sustainability, and explores the moderating effect of organizational characteristics. In this paper, we used data from Portuguese internal auditors collected through a survey, whose research hypotheses were analyzed by the partial least squares–structural equation modeling technique. We found that internal auditors use CAATs moderately in the exercise of their tasks. The results of our study show that there is a strong and positive effect of the use of CAATs by internal auditors on fraud detection in the purchase-to-pay business process, and that the intensity of this relationship is not influenced by the type and size of the entity. This study complements previous research and provides support to practitioners’ decisions that can boost the use of CAATs in internal auditing to make organizations more sustainable.

1. Introduction

Over the years, the goals of companies have changed considerably [1], leading to the rise of theories that describe the core corporate objective-shareholder theory developed by Friedman [2] and stakeholder theory developed by Freeman [3]. The shareholder theory focuses on financial goals leading to shareholder value maximization, and the stakeholder theory suggests the firm ought to maximize its value with more associated responsibility, thus creating value for all stakeholders. Zumente and Bistrova [1] warn that sustainability and long-term value creation are the key drivers to a firm’s commitments to its stakeholders. Therefore, firms should contribute for the well-being of society as for the environment.
Sustainability represents firms’ commitment/ability to conserve resources, aiming to satisfy current demands as well as those of the future generation [4]. Elkington (p. 20 [5]) refers to sustainability as the “principle of ensuring that our actions today do not limit the range of economic, social, and environmental options open to future generations”. The author also presents the triple bottom line, a set composed of three elements used to assess firms’ performance—economic, environmental, and social. Thus, companies are being led to enroll in the harmonization of these pillars by focusing on the 3Ps—profit, planet, and people.
Fraud is one of the main threats to business continuity and frequently culminates in the failure of organizations and economic, social, and environmental calamities [6]. Thus, fraudulent activities undermine the capacity of organizations to become more sustainable. According to Montesdeoca et al. [7], the lack of ethics in business promotes a decrease in responsibility, which in turns leads to the occurrence of fraud, a kind of malpractice, among others, which has harmful consequences to companies, such as loss of value, reputation, and image. Martinez-Ferrero et al. [8] found a negative relationship between sustainability practices and fraud. To strengthen this idea, Jan (p. 523 [9]) states, “Financial statements fraud seriously damages the sustainable development of enterprises and financial markets. Therefore, the establishment of an effective model to detect enterprises’ financial statement fraud is an important and urgent issue”.
Corporate governance has become a critical element for companies to achieve their goals and satisfying all stakeholders’ interests. Elkington [5] argues that a good corporate governance process will allow the company to have the opportunity to contribute to an authentic sustainable capitalism, ensuring the successful accomplishment of the triple bottom line. To improve firms’ performance, some authors recognize the importance of internal auditing and its positive repercussion for corporate governance and management [10,11]. As an element of the internal control system, internal auditing plays an important role in enterprise risk management, particularly in a more active control of fraud risk [12,13,14].
Human capital is a key driver for firm performance [15,16], which is also reflected in the auditing profession [17]. Therefore, Shapiro [12] suggests that both computer-based and human capital can improve the internal control of organizations. Thus, to achieve high quality levels for internal audits, the auditor must be skilled at several levels and supported by tools such as technology. Technology has been considered a driver for decision support [18]. Narrowing down the technology referred to, we can specify a very useful tool called computer-assisted audit tools and techniques (CAATs).
This paper proposes a study of the relationship between the adoption of CAATs by internal auditors and corporate sustainability. The specific objectives of the paper are (1) to identify the CAATs used by internal auditors, (2) to study the effect of CAATs in corporate sustainability, and (3) to analyze the moderating effect of company characteristics in the relationship between CAAT adoption and corporate sustainability.
The attribute standards for the professional practice of internal auditing of the Institute of Internal Auditors [19] (IIA standards) recommend that internal auditors should have sufficient knowledge to assess fraud risk (standard 1210 A2), and that in exercising due professional care they should consider the use of technology-based audit and other data analysis techniques (standard 1220 A2). Consequently, the skills and adoption of technology-based auditing techniques may be relevant in the exercise of proficient work, namely, in the prevention and detection of fraudulent acts. However, the current research focuses on the determinant CAAT adoption factors by internal auditors [20] or the impact of the use of CAATs on fraud detection by external auditors [21]. On the other hand, some authors advocate for the positive effect of CAAT adoption on fraud risk assessment by internal auditors, without supporting this proposition with empirical studies [22,23,24]. Thus, our study’s main motivation is to expand the knowledge about the effect of CAATs on fraud detection, contributing in this way to improving the sustainability of organizations.
We obtained data from 60 Portuguese internal auditors from a survey, and the research hypotheses were tested using the partial least squares–structural equation modeling (PLS-SEM) technique. The results suggest that the use of CAATs improves internal auditors’ ability to manage fraud risk in the procurement cycle. We also found that the intensity of the relationship is not affected by the characteristics of the organization, namely, the type and size of the entity.
The remainder of this paper consists of four sections. The literature review section underlines the importance of internal auditing as an instrument of corporate governance and presents the arguments supporting the research hypotheses. The research method section introduces the sample and survey instrument and briefly explains our data analysis procedure. The results section analyzes the data. The discussion section offers a discussion of the results, and the last section presents the conclusions, implications, and limitations of our research and gives directions for future study.

2. Literature Review

2.1. Shareholder Value Creation

Given the rise of several theories to support companies’ mission statements—shareholder theory and stakeholder theory—Zumente and Bistrova [1] suggest that shareholder value creation should be supported by putting more attention in a long-term orientation instead of a short-term one. Hence, the company should be concerned about its actions in the long term in order to assure its presence in the economy, thus acting in a more sustainable and responsible way [25]. Here arise two keywords: “corporate social responsibility” (CSR) and “sustainability”. To assure shareholder value creation, acting in a more responsible and sustainable way, it is important to develop and implement a good corporate governance system [26]. Defective corporate governance will promote resource deviation, corporate fraud, and hence, financial scandals [27]. Unfortunately, we have witnessed many cases of fraud around the world that harm citizens. Denying the existence of corporate fraud as well as its devaluation only benefits the cheaters, endangering the stakeholders’ interests and, in some cases, the community where corporations are [28]. Even before these recent scandals, demand for nonfinancial information has been increasing, particularly in ethical, social, and environmental matters [7]. The authors state the relevance of the convergence of these areas due to their linking to CSR [29], a competing key drive [30]. Additionally, the European Commission (EC) implemented the Non-Financial Reporting Directive (NFRD) (Directive 2014/95/EU), which applies to large listed companies, banks, and insurance companies with more than 500 employees; such entities are required to publish reports on the policies they implement in relation to (1) environmental protection, (2) social responsibility and treatment of employees, (3) respect for human rights, (4) anti-corruption and bribery, and (5) diversity on company boards (in terms of age, gender, and educational and professional background). In 2021, the European Commission presented its proposal for a Corporate Sustainability Reporting Directive (CSRD), which aims to revise and strengthen the NFRD and to bring—over time—sustainability reporting on par with financial reporting. Companies will have to report on how sustainability issues affect their business and the impact of their activities on people and the environment.
In order to guarantee businesses’ continuity and growth, it is vital to pledge efficient corporate management. However, due to fraud, several businesses fail [31], causing economic, social, and environmental calamities [6]. Considering the harmful effects of fraud, it is also important to notice that firms’ investors are also harmed by fraud, which will have repercussions in the loss of confidence of potential investors [32]. Moreover, fraud entails loss of value, reputation, and image for private companies [7], whereas in the public sector it entails loss of jobs, deterioration of the quality of public services, and destruction of the value of money for taxpayers [33].
Yu and Rha (p. 1 [34]) highlight that “…accounting fraud is a highly unethical management activity with a significant negative influence on stakeholders and can harm a firm’s long-term sustainability prospects. Accounting ethics is associated with corporate sustainability, and accounting transparency has become a critical requirement for major companies”. Due to the consequences instigated by fraud, Margret and Peck [35] state that issues of CSR are increasingly relevant to organizations and to sustainable business practices.

2.2. Internal Auditing as a Key Element of Corporate Governance

To be aware of the effects of fraud, especially occupational (internal) fraud cases, Ramamoorti [36] highlights the importance of firms having internal control systems, namely, an internal audit department. Flesher (pp. 1–3 [37]) states, “Necessity created internal auditing and is making it an integral part of modern business. No large business can escape it. If they haven’t got it now, they will have to have it sooner or later, and, if events keep developing as they do at present, they will have to have it sooner”. Vadasi et al. [38] highlight the need for restoring investors’ confidence through corporate governance that improves the attention given to internal audits and its role in corporate governance. Indeed, internal auditing was moved into the role of supervision and improving risk management processes and corporate governance [39]. The importance of internal audit as a corporate governance mechanism is shown by several studies [39,40,41,42].
The interaction between internal auditing and an audit committee, external auditing, and management, described by Cohen et al. [43] as the “corporate governance mosaic,” is crucial to boosting the role of internal audits in corporate governance [44]. Most times, corporate governance mechanisms are related to large firms, though they are also important to small and medium enterprises (SMEs) [45]. A good corporate governance process will help SMEs in the decision process and access to different resources.

2.3. Hypothesis Development

Leung et al. (p. 6 [10]) state that “Internal auditors are positive about their role in corporate governance but are less confident with respect to how to put such a role into practice”. The auditors are aware of their role, and have benefited from the development of information technology (IT) and its usage in several businesses. Ramamoorti and Weidenmier [46] emphasize the importance of IT because it helps many organizations to achieve better performance in their activities. In what concerns internal auditors, they performed better by using CAATs, which allowed internal auditors to keep playing their key roles in firms’ corporate governance process. According to Singleton et al. [47], CAATs are described as tools and techniques provided by IT to help auditors manage an organization’s information system by performing the set of tasks they are entitled to, namely, fraud detection. Due to its effectiveness, CAATs have gained relevance in audit methodologies [48], thus contributing to a good corporate governance process, and hence, shareholder value creation. Despite the awareness of the relevance of CAATs by internal auditors, Li et al. [49] state through previous studies that the use of CAATs in an internal audit context is lower than expected. In the context of external auditing, Bierstaker et al. [50] and Mansour [51] express similar concerns.
The IIA’s standards [19] recommend the use of CAATs for the proficient exercise of professional activity. CAATs can be used by internal auditors in tasks related to testing internal controls [22], in risk assessment during the planning process [24], and in forensic investigations [23]. Singleton et al. [47] mention six benefits of using CAATs: (1) CAATs can be used to audit whole data, allowing a trained auditor to identify a plethora of red flags; (2) CAAT software products use commands and procedures that auditors are used to, shortening the learning curve (e.g., Microsoft Excel, Stata, and SPSS); (3) CAATs facilitate auditors in creating reports; (4) CAATs are flexible and can export data in several formats; (5) some CAATs typically cannot edit the data, preserving its full integrity; and (6) CAATs allow auditors to automate test running. Consequently, CAATs improve the internal efficiency of internal audits [52] and are critical to organizations’ ongoing survival and competitiveness [22].
CAATs can be used to identify fraud risks and to detect fraud. Fraud is a disruptive event, whereas fraud risk can be managed [53]. Coderre [23] and Smidt et al. [54] note that CAATs can be used by internal auditors to highlight transactions with characteristics likely associated with fraudulent acts—red flags. In parallel, CAATs can be used to allow the auditor to discover fraud cases and their causes with greater evidence [55,56], thus making it possible to improve the audit quality. Pereira and Nascimento [57] found that audit software was the second most used instrument by Brazilian internal auditors to detect fraud.
In summary, the use of CAATs improves internal audit performance in terms of both efficiency and effectiveness [47]. On the one hand, the internal auditor is able to cover the highest risk areas more frequently, improving the reliability of audit results [49] and producing more relevant, reliable, and timely information [58]. On the other hand, the use of CAATs increases the likelihood of internal auditors detecting anomalies, such as fraudulent activities, that would otherwise not be discovered [49], thus improving the quality of their work [58].
The empirical studies of Ariwa et al. [21] and Olasnami [59] highlight that CAATs have enhanced the ability of external auditors to detect fraudulent activities. Considering that external auditors and internal auditors perform oversight activities, it is expected that the use of CAATs will increase the likelihood of internal auditors identifying fraudulent activities, thus being reflected in smaller losses, and consequently contributing to corporate sustainability. Additionally, internal auditing may influence improving sustainability disclosures [60], and CAATs are one of the most apt technological innovations for improving the reporting of sustainability indicators [61].
Based on the literature review, there should be a positive relationship between CAAT adoption and corporate sustainability, as captured by the following research hypothesis:
Hypothesis 1 (H1).
The adoption of computer-assisted audit tools positively influences the scope of detection of fraudulent schemes.
The potential benefits of using CAATs in internal auditing may be affected by organizational context, namely, the ownership and size of the entity. Firstly, private and public organizations have distinct goals to achieve. Whereas the former are focused on shareholder value creation (through profit maximization), the latter are more focused on providing public goods and services efficiently [62]. Furthermore, Goodwin [63] states that (1) public organizations have a more rigid and bureaucratic structure, where activities are covered by legislation, and (2) public organizations do not have profit maximization as their key goal, yet they must be efficient when providing public goods and services to their citizens. Additionally, Lartey et al. [64] state that differences exist in financial reporting between private firms and public entities. In the scope of our paper, authors like Goodwin [63] and Spraakman [65] state that internal auditing is more common and accepted within public organizations than private firms. On the other hand, it is argued that private firms put a higher value on management control systems due to their complex and dynamic environments; thus, they are more prone to generating risks for their businesses [66]. In this vein, Goodwin [63] found that internal auditors’ involvement in financial risk management activities was higher in private firms compared to the public sector. The Common Body of Knowledge 2015 [67] reported that the internal auditors in privately held organizations put more priority on fraud risk than internal auditors in the public sector did. Moreover, the Association of Certified Fraud Examiners [68] reported that for-profit organizations had a higher incidence of fraud than governmental organizations. Due to computerization, many governments run their services through e-government applications, and their data are also stored digitally [69]. Furthermore, the subset of this data should be audited using proper computerized detection tools.
The increasing use of IT in business processes gives organizations, whether they belong to the public or private sector, a huge volume of data that needs to be processed and analyzed. Therefore, in the era of digitalization, internal auditing is required to use data analysis tools and software to prevent fraud and give more comfort to stakeholders [70]. However, the effective implementation of CAATs has been slower to develop in the public sector. Compared to the private sector reality, the Common Body of Knowledge 2015 [71] reported that internal auditors in the public sector are less proactive in using data mining and analytics techniques in the areas of identifying fraud and monitoring risk/control.
Public organizations differ from their private counterparts in terms of environmental demand and structural characteristics [72], elements that may influence internal auditors’ decisions to employ CAATs in fraud discovery tasks. First, internal auditing departments in the public sector have greater difficulty attracting and retaining employees with IT skills, particularly in cybersecurity and data mining [71]. Moreover, public organizations denote a greater need to invest in skills and competencies of internal audit staff for a more effective response to fraud [73]. Consequently, investing in CAATs in the private sector turns out to be more productive, as they have more talented employees capable of being used effectively to detect fraudulent practices. Second, internal auditors in public entities exhibit less compliance in the application of IIA standards [71]. These standards recommend the use of CAATs for more efficient and effective professional activity. The context of less pressure for compliance may lead internal auditors in the public sector to opt less for the use of CAATs in detecting fraudulent schemes. Third, internal audit departments in the public sector enjoy a lower level of independence from management [71]. Independence affects the stages of the audit process, notably in the design of the audit procedures to be performed, the conclusions to be drawn from the audit evidence, and the audit report. Considering the potential of CAATs in uncovering anomalies, internal auditors may be constrained to use these tools to a lesser extent in the public sector. Finally, the Common Body of Knowledge 2015 [74] reported that internal audit departments in the public sector are less prevalent in some performance measurement metrics (e.g., timely closure of audit issues). The lower concern for performance evaluation may lead to less pressure to use more sophisticated techniques to improve the efficiency (cost/time) and effectiveness (quality) of audits in the public sector. In the opposite vein, many private sector organizations consider IT as a key element to develop competitive advantages and improve their performance [75].
Lee and Xia [72] suggest that the type of organization should be considered a moderator variable in the study of IT use, and a stronger moderating effect can be expected in for-profit organizations. Consequently, the different objectives and operational context of public and private organizations can impact the relationship between the use of CAATs and fraud detection activities. Therefore, we hypothesize that:
Hypothesis 2 (H2).
Ownership moderates the effect of use of computer-assisted audit tools in the scope of detecting fraudulent schemes, such that the effect is stronger in private organizations.
Secondly, the literature reveals that organizational size is a determinant of CAAT adoption [18,49,50,76,77]. For example, Daoud et al. [77] argue that it is unanimously accepted that there is a general positive relationship between organizational size and CAAT adoption. Moreover, Li et al. [49] argue that it is expected that size has a positive impact on CAAT adoption because larger entities have the best chances to afford CAATs and have more transactions and procedures to be audited than smaller entities. Rosli et al. [78], Abou-El-Sood et al. [79], and Pedrosa and Costa [80] also found that there is a positive association between the sophistication of the CAATs used and organizational size, because in small entities the investment in CAATs is not considered economically worthwhile [18].
Organizational size is a critical factor to consider in fraud control [47]. According to Singleton et al. [47], size is reflected in the following points: (i) fraudulent financial reporting is more likely to occur in large organizations, whereas misappropriation of assets occurs more in small organizations; (ii) large organizations have more resources to improve internal control and invest in internal audit and fraud prevention and detection programs; and (iii) segregation of duties is insufficient or absent in smaller organizations, and this control activity is relevant to preventing fraud. Barnes and Webb [81] found that susceptibility to fraud and the resulting losses are affected by organizational size.
Organizational size may also have a contingent effect on the original relationship between the use of CAATs and the scope of activities performed by internal auditors in fraud detection. Investment in CAATs is a whole-firm decision, not an individual’s decision, because it represents a significant investment [82]. However, internal auditors are free to choose the most appropriate tools to perform their activities. The IIA standards [19] do not impose the use of CAATs, but rather state that internal auditors should consider their use. The interaction of the provision of CAATs to internal auditors (which is higher in large entities) and the perception of their usefulness in performing certain tasks may have an effect on the scope of activities performed in detecting fraudulent schemes. The moderating effect of size in the study of IT use is suggested by Lee and Xia [72]. In the specific domain of fraud, the Common Body of Knowledge 2015 [67] reported that internal auditors in large organizations use more data mining and data analytical tools to detect fraudulent schemes. Kummer et al. [83] found that larger organizations use more fraud detection instruments, which subsequently leads to more fraud being discovered. For this reason, the use of CAATs in actual internal audit activities to achieve certain results (e.g., detecting fraud) may be affected by the organization size. Drawing from the foregoing discussion, the following hypothesis is proposed:
Hypothesis 3 (H3).
Entity size moderates the effect of the use of computer-assisted audit tools in the scope of detecting fraudulent schemes, such that the effect is stronger in large organizations.
Figure 1 illustrates the research framework and hypotheses proposed in this section.

3. Research Method

3.1. Sample and Data Collection

The target population of this study comprised internal auditors working in private and government Portuguese organizations. The unit of analysis was the individual. The inexistence of a database with the identification of internal auditors meant that contact with the target population was made by e-mail, via the Portuguese Internal Auditing Institute with its members and through the social network LinkedIn. Thus, as obtaining a sampling frame in this case was difficult, we used a non-probability sampling, or more specifically, a convenience sampling. A total of 128 questionnaires were received but 68 responses had to be discarded due to excessive missing data and straightlining responses (According to Hoonakker and Carayon [84], nonresponse items in internet surveys are affected by design factors, namely, they are easily discarded and prematurely completed. Moreover, we forced responses to questions. This approach encourages some individuals to stop answering the questionnaire [85]). Therefore, a total of 60 usable questionnaires were received.
To collect data, we used an internet-based survey questionnaire, which was developed through a review of the literature. The survey method is suitable for obtaining data in a context where the variables studied are associated with organizations and professional practices [85]. The availability of the questionnaire on the Qualtrics platform was preceded by the application of the translation/back-translation technique of the scales, as well as a pre-test with three auditors.
The Mann–Whitney test was used to compare the early and late response for all items used to measure the dependent and independent variables. No significant differences were found in the comparisons, indicating overall a likely absence of nonresponse bias [86]. In order to minimize common method variance, we adopted the following procedures [87]: (i) The questionnaire contained an introductory note explaining the purpose of the research, ensuring the anonymity of responses, informing them that participation was voluntary, providing the contacts available should any questions arise, and encouraging them to answer honestly according to their experience; (ii) inclusion of the variables in the questionnaire did not follow a logic and the measurement items were mixed in order to avoid illusory correlations; (iii) we labeled the points of the scale to reduce acquiescence bias; and (iv) we used nominal scales and five- and seven-point Likert scales to minimize the anchor effect. Finally, we used Harman’s single-factor test [87] to check whether a factor accounted for less than 50% of the total variance [88]. The exploratory factor analysis with unrotated factor solution yielded seven factors with eigenvalues greater than 1, explaining about 78.1% of the variance, with the first factor accounting for 48.8% of the variance. Therefore, results suggest that common method variance was not present.
The respondents’ mean age was 38.6 (SD = 9.3) and they worked in an internal audit department that had an average of 13 employees (SD = 15.7). The majority of the respondents were men (55%), in-house internal auditors (97%), and had an average of 9 years (SD = 6.7) of professional experience in internal auditing. Additionally, slightly more than half of the respondents occupied the position of audit senior (30%) and audit manager (25%). Most of the participants were trained in the economic–financial sciences, namely, undergraduate (35%), postgraduate (13%), and master’s (37%). The main certifications held by our respondents were Certified Internal Auditor (25%), Accountant (22%), and Certification in Risk Management Assurance (8%).

3.2. Measurement

Our questionnaire contained two exploratory questions to identify the prevalence of CAATs in internal audits. First, respondents were asked to indicate the extent to which they use CAATs in their Internal Audit Department and, subsequently, they gave their opinion on the frequency of use of 19 CAATs in internal audits. This list of CAATs was based on several studies [47,48,51,89,90]. In both questions, the items were measured on a five-point Likert scale, where 1 = “never,” 3 = “sometimes,” and 5 = “always”.
Corporate sustainability, our dependent variable, is proxied by the scope of detection of fraudulent schemes performed by internal auditors in the purchase-to-pay business process (FRAUD). Fraudulent activities can destroy a business and frequently result in economic, social, and environmental calamities [6]. Consequently, fraud affects the ability of organizations to create value for shareholders and other stakeholders, resulting in a threat to organizational sustainability. Fraud risk is considered by internal auditors to be one of the top five organizational risks impacting internal audit activities [67]. Baader and Kremar [91] developed a list of seven common fraud patterns in the purchase-to-pay business process: kickback fraud, bid rigging, shell company, double payment, pass-through, non-accomplice vendor, and private purchases. We used these seven items to represent the scope of activities performed by internal auditors to detect fraud in the procurement cycle. The internal auditors evaluated the relevance of these items in the performance of their job using a seven-point Likert scale ranging from 1 (strongly disagree) to 7 (strongly agree).
The independent variable was CAAT usage (CAAT_USE). According to Henderson III et al. [20], usage is a nebulous concept and can be defined and measured in different ways. Thus, CAAT usage by internal auditors was measured with multi-item measures, allowing the researcher to capture the diversity of usage [20]. Consequently, participants were asked whether they use CAATs in specific internal auditing activities. Our scale comprised 31 items developed by referring to prior literature [49,76,92,93] and sometimes modified to meet the needs of this research. We measured these items on a scale ranging from 1 (strongly disagree) to 7 (strongly agree).
The moderating effect of entity characteristics was measured separately through two dichotomous variables: OWNER (private = 1 and public = 0) and ENTITY_SIZE (large entities = 1 and small and medium entities = 0). The classification of micro, small, and medium-sized entities (SME) used in Portugal follows the criteria defined in the EU Recommendation 2003/361/EC, 6 May. The category of SME is made up of organizations that employ fewer than 250 persons and that have an annual turnover not exceeding EUR 50 million and/or an annual balance sheet total not exceeding EUR 43 million. Organizations that do not comply with these criteria are classified as large entities.
All the measurement items of FRAUD and CAAT_USE constructs used in this study and their sources are shown in Appendix A The questionnaire also included demographic and characteristics information for our participants, such as age, work experience, gender, education, professional qualifications, position held in the entity, employment relationship, and internal audit department size.

3.3. Data Analysis

Descriptive analysis of the variables and summarization of the participants’ characteristics were performed using IBM SPSS Statistics 26. SmartPLS 3.0 was used to perform PLS-SEM to validate the measurements and test the two formulated hypotheses.
PLS-SEM is a second-generation regression technique that allows the causal relationships between one or more independent variables and one or more dependent variables to be simultaneously estimated [94] without imposing distributional assumptions on the data [95]. PLS-SEM is a method that assesses the measurement and structural models separately, combining principal component analysis with ordinary least square regressions [95]. Although PLS-SEM is similar both conceptually and practically to multiple regression analysis [95], this method can be used to better understand more complex structural and measurement models [94]. PLS-SEM is a suitable method when the goal is to perform a causal–predictive analysis [96] in exploratory studies that use small samples and where constructs are measured by several items with different scales of measurement [96]. PLS-SEM is a technique used in several social science disciplines [95], namely, in studies that seek to explain the determinants of auditors’ use of CAATs [20,93]. Consequently, PLS-SEM is a suitable method for the current study, where it was used to predict the effect of the independent variable on the dependent variable and the moderation effect.
The implementation of the PLS-SEM model comprises two steps: (1) estimation of the reliability and validity of the measurement model, and (2) evaluation of the structural model and conclusion about the hypotheses under study [97]. Based on the guidelines proposed by Hair et al. [85], the present study used the reflective–reflective model since all measured indicators are manifestations of the underlying constructs. The measurement model assessment involves examining the individual indicator reliability, internal consistency reliability, convergent validity, and discriminant validity. In the assessment of the structural model, we used the coefficient of determination (R2), the predictive relevance (StoneGeisser Q2), and the sign and relevance of the structural path coefficients. A bootstrapping procedure with 5000 samples was used to estimate the path coefficients’ significance [85].

4. Empirical Results

4.1. Descriptive Analysis

The first goal of this work was to identify the CAATs used by internal auditors. The average use of CAATs was 3.55, indicating that the use of IT in internal audit processes is not very intense (Table 1). This result corroborates the international findings of the Common Body of Knowledge 2015 [98], which found that 52% of internal auditors made no or very little use of CAATs in audit processes and 23% of respondents had a primary reliance on manual systems and processes.
From an individual perspective, the internal auditors reported that the most used CAATs are generic personal productivity tools, database management systems, ActiveData for Excel, and firm-tailored audit software. On the other hand, several CAATs identified in the questionnaire have an average of below two, signaling that these tools are virtually unused by internal auditors. Additionally, the Mann–Whitney test of difference of means indicates that the use of the 19 CAATs was similar between internal auditors working in private and public entities. Excluding the data mining and erase fraud manager tools, internal auditors at large entities had an identical level of use of CAATs as those at smaller entities.
Table 2 summarizes the relevant statistics for the variables and their measures used to test the research hypotheses underlying the remaining objectives of this work. The variable CAAT_USE presented a mean of 5.07, with the items having scores between 3.63 and 5.75. Overall, the data show that CAATs are sometimes used by internal auditors in concrete tasks, although there was a notable heterogeneity in the data mirrored by the high standard deviations in some items. The three items that showed the highest agreement were the use of CAATs to identify specific records to be analyzed, select sample transactions, and visualize data. Conversely, CAATs are hardly used to apply Benford’s law or to assess the going concern assumption.
The average FRAUD score was 4.14, with the items having means between 3.28 and 5. The standard deviations of all items were above 2.1, which denotes a remarkable variability in responses. The most (least) relevant item was the detection of double payments (bid rigging). The data also revealed that 80% of the participants work in private entities (OWNER) and 75% in large entities. Skewness of each item was less than the threshold of 1.96.
Table 3 presents a summary of the Mann–Whitney tests for the difference of means in the latent variables FRAUD and CAAT_USE and their respective indicators, considering the organizational context (size and ownership). The results show that there were statistically significant differences for several indicators of the latent variables FRAUD and CAAT_USE between respondents working in public and private organizations. In turn, the distribution of the respondents’ assessment of the indicators was practically indifferent to the size of the organizations.

4.2. Partial Least Squares—Structural Equation Model Analysis

Table 4 shows the results of the item loadings, Cronbach’s Alpha (CA), composite reliability (CR), and average variance extracted (AVE), the parameters used to evaluate the measurement model. All items had standardized loadings greater than 0.7, providing evidence of individual indicator reliability [85]. For both constructs, CA and CR were greater than 0.7, which indicates sufficient internal consistency reliability [94].
To assess the validity of the constructs, we started by checking that the AVE of the FRAUD and CAAT_USE variables was greater than the minimum threshold value of 0.50 [95], meaning that the constructs explained a significant proportion of the variance of the items. Thus, we concluded that the constructs had convergent validity. Subsequently, we verified that the constructs had discriminant validity (Table 5). The square root of the AVE of each construct was higher than its correlation with the remaining constructs, confirming the Fornell and Larcker [99] criterion. Additionally, the heterotrait-monotrait (HTMT) ratio was lower than the minimum threshold value of 0.85 [95].
The structural model assessment was performed in two steps. In the first step, the focus was on the relationship between CAAT_USE and FRAUD (Hypothesis 1). Subsequently, moderation was introduced (Hypotheses 2 and 3) and the full structural model was assessed. Table 6 shows the results without the moderation effect. The R2 of the FRAUD variable was 0.448, close to the threshold of 0.50, considered an explanatory model displaying moderate power [95]. The Q2 value generated by a blindfolding procedure with an omission distance of 7 was larger than zero, indicating the predictive relevance of the structural model. The estimated path coefficient showed a positive effect of CAAT_USE on FRAUD (β = 0.669; p < 0.01), confirming H1. This result suggests that the use of CAATs produces an effect on internal auditors in performing activities that can minimize the risk of fraud in the procurement processes.
Second, the structural model was assessed by including the two moderating variables separately. Table 7 shows that the model’s predictive accuracy evidenced by the R2 remained at a level close to moderate, as well as that the Stone–Geisser Q2 metric was greater than zero, confirming the predictive relevance of the models. The results show that the positive effect of CAAT_USE on FRAUD remained significant, with path coefficients slightly higher than estimated in the unmoderated model. However, the effects of the moderation variables on the relationship between CAAT_USE and FRAUD were not found to be statistically significant, thus not allowing support for H2 and H3.

5. Discussion

This study began by identifying the type of CAATs used by internal auditors. The results show that the use of IT in internal audit processes is not very intense, corroborating the findings of other studies [92]. According to Cangemi [98], internal auditors recognize that they could make better use of technology, and acknowledge that there are constraints to its adoption. Despite the potential of CAATs, the lack of IT training and expertise, difficulties in applying IT in real situations, and the risk associated with IT use are examples in the literature of factors that increase resistance to the proliferation of CAATs in the general audit context [80,98]. Therefore, identifying the determinants of IT adoption has given rise to several theories (theoretical models used to understand IT adoption include the unified theory of acceptance and use of technology [100], the technology acceptance model [100,101], the theory of planned behavior [102], diffusion of innovation [103], and the technology–organization–environment framework [104]) and empirical studies in the domain of CAATs in internal audits (see [20,48,54,92,105]).
The first hypothesis (H1) posits that using CAATs positively affects the scope of detection of fraudulent schemes. The results indicate that the hypothesis is supported by the data. Our study presents empirical evidence that supports the shared view in the literature [23,55,56,57] that the adoption of CAATs improves the capabilities of internal auditors to detect fraud. Additionally, the estimated path coefficients show the magnitude of the impact of the independent variable on the dependent variable: A one-unit change of CAAT_USE changed the level of FRAUD detection between 0.68 and 0.69 (Table 6 and Table 7). Organizations are witnessing a growing process of data digitalization and process automation, whereby the effectiveness in the performance of the internal audit role is conditioned to the adoption of IT adapted to the context of the organization in which they operate. Therefore, Ariwa et al. [21] suggest that the use of CAATs should be encouraged so that the organization can operate in a fraud-free environment. Organizations lose 5% of their sales annually because of fraudulent activities [68]. The amount of money lost represents a staggering drain on the global economy, with negative consequences for job creation, the production of goods, and the provision of public services [68]. Thus, the effective use of CAATs would contribute to the minimization of fraud occurrence, which highlights the role of IT in improving organizational sustainability.
The second and third hypotheses (H2 and H3) propose that entity characteristics have a moderating effect on the relationship between CAAT use and the scope of fraudulent scheme detection. The results indicate that the hypotheses are not supported by the data. The literature shows that there are differences in the challenges and objectives between public and private organizations [62], which could impact the role of internal auditing in monitoring internal control. In this regard, the Common Body of Knowledge 2015 [67] reported that the focus on fraud risk and fraud prevention/detection is higher in privately held organizations compared to public entities. Furthermore, Lee and Xia [72] report that the moderating effect of the type of organization in the study of IT use is more pronounced in for-profit organizations. Our study provides empirical evidence that ownership has no influence on the relationship between using CAATs and fraud detection. This finding shows that there is a homogeneous view of the usefulness of CAATs for improving corporate sustainability. In fact, fraudulent activities frequently end in business failure and economic, social, and environmental calamities [6], thus damaging organizational sustainability. Fraud risk is a contemporary reality that any organization faces today [67]. Fraud entails loss of value, reputation, and image for private companies [7], whereas in the public sector it entails loss of jobs, deterioration of the quality of public services, and destruction of the value of money for taxpayers [33]. Consequently, fraud risk management has gained a prominent position in 21st-century corporate governance [53], where incorporating more IT into internal audit processes to improve sustainability has become a global challenge shared by both public and private organizations. In addition, the results show that auditors in public entities have similar tools as their counterparts in private entities (see Section 4.1), and thus the technological potential is used to detect fraud in the same way.
The results also show that entity size does not moderate the relationship between CAAT usage and fraud. The finding is not consistent with the Common Body of Knowledge 2015 [67], which found a higher incidence in the use of data mining and data analytics for fraud discovery in larger entities. The result of the moderation effect could be explained by the “scope of size”. Lee and Xia [72] suggest IT department size as an alternative proxy to the organization size. In this case, the results of the robustness test that considered the dimension of the Internal Audit Department maintained the previous conclusion (size was measured by the number of employees in the Internal Audit Department. The moderation model with the Internal Audit Department Dimension variable yielded the following structural model measurement indicators: R2 of 0.488; Q2 = 0.359; path coefficient of the moderation effect of 0.186 (t value = 1.362, p-value = 0.173).
Our finding can be attributed to the perception that exists in internal audit departments about the types of IT that are most useful for fraud prevention and detection. The results in Table 1 show that among the most commonly used CAATs are generic personal productivity tools and ActiveData for Excel—in other words, technologies that are widely used and do not require a high allocation of financial resources. This finding corroborates Araj [67], who argues that internal auditors are not fully aware of the specialized knowledge needed to respond effectively to fraud risk. Some studies [106] have found that the organization size correlates with fraud; therefore, the use of more sophisticated CAATs may be critical for internal auditors to respond appropriately to fraud.

6. Conclusions, Contributions, Limitations, and Future Research

Technology can offer opportunities to improve efficiency and effectiveness, helping organizations to become more sustainable. The results of our study show that there is a positive effect of the use of CAATs by internal auditors on fraud detection in the procurement cycle, and that the intensity of this relationship is not influenced by the type or size of the entity.
The findings provide theoretical and practical implications. First, this paper contributes to a stream of research on the use of CAATs and their effects on performance. Our findings agree with studies that have focused on external auditors [21,93], pioneering in focusing on the issue in the context of internal audits and sustainability. Second, we identified the type of CAATs used by internal auditors in the performance of their profession, expanding the list of IT considered in the study by Kim et al. [92]. Third, this study’s use of the multivariate technique of PLS-SEM allows for more robust analyses to be made in exploratory research in comparison to previous studies [21,52] that used regression models. Fourth, the use of CAATs in concrete audit activities was measured by a more comprehensive scale compared to previous studies [20], with the CAAT_USE construct measurement model identifying 21 items with satisfactory levels of reliability.
Finally, the relationship found between CAAT use and fraud has practical implications. This study helps to understand the effect of using CAATs to improve internal audit performance through the benefits it may produce in terms of minimizing fraud risk. The use of IT increases the analytical capacity of internal auditors, which translates into expected gains in terms of detecting irregularities in accounting records, theft of assets, or inefficient operations. Consequently, improving the quality of internal audits will have a positive effect on corporate governance, helping organizations to achieve higher levels of sustainability.
This study has certain limitations. First, the sample size may have influenced the scale purification process of the CAAT_USE construct. The sample size affects the statistical tests, and it is desirable for it to be greater than 100 [95], although our study complies with the minimum size thresholds for the application of the PLS-SEM. Another limitation stems from the sensitivity of the fraud issue, whose measurement may be influenced by “political correctness”. Future studies could control for social desirability direct effects on responses by using the 10-item social desirability scale from Strahan and Gerbasi [107] and its interaction with other constructs. The measurement of the FRAUD variable focused only on fraudulent schemes in the procurement cycle. Future studies could extend the scope of activities performed by internal auditors in the detection of fraud in the economic, social, and environmental fields or identify the number of frauds detected in a given period by internal auditors. Other limitations include the specificity of the study’s geographical focus. An application in different cultural contexts, namely, common-law countries, would be a natural extension. Future research may also consider other entity characteristics to check moderator effects, such as industry. The direct effect of organizational size on the use of CAATs could also be explored. The organizational size can be measured using quantitative and qualitative criteria, with both approaches presenting advantages and disadvantages in their use [108]. Future studies could analyze the moderating effect of size based on other indicators, such as output measures (e.g., sales) or financial resources (e.g., net assets).

Author Contributions

Conceptualization, A.S. and T.A.D.; methodology, A.S.; software, A.S.; validation, A.S.; formal analysis, A.S. and T.A.D.; investigation, A.S. and T.A.D.; resources, A.S. and T.A.D.; data curation, A.S.; writing—original draft preparation, A.S. and T.A.D.; writing—review and editing, A.S.; visualization, A.S. and T.A.D.; supervision, A.S.; project administration, A.S. and T.A.D.; funding acquisition, A.S. and T.A.D. All authors have read and agreed to the published version of the manuscript.

Funding

The authors acknowledge financial support via ADVANCE-CSG from the Fundação para a Ciência and Tecnologia (FCT Portugal) through research grant number UIDB/04521/2020.

Institutional Review Board Statement

The study was conducted according to the guidelines of the Declaration of Helsinki, and approved by the Ethics Committee of ISEG—Instituto Superior de Economia e Gestão (protocol code 15/16 December 2021).

Informed Consent Statement

Informed consent was obtained from all subjects involved in the study.

Data Availability Statement

Data used and analysed during this study are available from the corresponding author by request.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Table A1. Survey items used for dependent and independent variables.
Table A1. Survey items used for dependent and independent variables.
ConstructsCodeIndicatorsSource
CAAT_USERisk_errorsIdentify and assess the risks of errors in the audited information and processesAdapted from [93]
Risk_fraudIdentify and assess fraud risks in the audited information and processesAdapted from [93]
Detect_errorsDetect errors in the audited information and processes Adapted from [93]
Detect_fraudDetect fraud in the audited information and processes Adapted from [93]
Unexp_relationIdentify unusual or unexpected relationship or transactions[93]
MaterialDetermine the materiality level[93]
Work_programPrepare the audit work programs in the planning phaseAdapted from [93]
Evidence_contObtain evidence about control effectiveness[93]
SampleSelect sample transactions from electronic files[93]
RepeatUse large populations to electronically test a repetitive calculation[93]
Going_concernAssessment of going concern assumption[93]
Extract_recordsExtract specific records to be analyzed, such as payments more than a specified amount or transactions before a given date[93]
ReperformRe-performance procedures[76]
Extract_dataExtract top or bottom records in a database[93]
MissingIdentify certain records or numbers in a series that are missing or duplicatedAdapted from [93]
BenfordApply Benford’s law for the detection of incorrectly recorded valuesAdapted from [93]
Sort_dataSort transactions with specific characteristics[93]
PopulationTest an entire population instead of a sample[93]
AccuracyCheck data accuracy, such as the price used in the transactionAdapted from [93]
StratifyStratify, summarize, and age information[93]
Match_dataMatch data across files[93]
Data_sumSummarize data[49]
DescriptiveCompute descriptive statistics[49]
Cross_dataCross-tabulations[49]
RatioRatio analysis[92]
SequenceExamine data sequence[49]
MiningText mining[49]
TendencyTendency analysisAdapted from [92]
VisualizationData visualization[49]
RelationshipPerform analysis of relationships between variables, such as linear regressionAdapted from [92]
ClusterClustering[49]
FRAUDKickbackKickback fraud—collusion between suppliers and managers/employees for fictitious or inflated purchases (e.g., placing multiple purchase orders for small amounts for the same product)[91]
RiggingBid rigging—vendors who pay to influence a competitive bidding process in their favor (e.g., influence the specifications in their favor)[91]
ShellShell company—fictitious companies or companies with reduced activity with which the company is suddenly connected (e.g., company data coincide with employee data)[91]
DoubleDouble payment—payment is often made twice (e.g., a given purchase was invoiced at several points in time)[91]
PassPass-through—manager/employee has a company that sells goods and services to the entity where he/she works at inflated prices (e.g., high-volume purchases from a new or unauthorized supplier)[91]
AccompliceNon-accomplice vendor—involvement of innocent suppliers in the embezzlement of company funds or assets (e.g., overpayment of an invoice, requesting the return of the difference)[91]
PersonalPersonal purchases—making private purchases at the expense of the company (e.g., receipt of unjustified goods)[91]

References

  1. Zumente, I.; Bistrova, J. ESG importance for long-term shareholder value creation: Literature vs. practice. J. Open Innov. Technol. Mark. Complex. 2021, 7, 127. [Google Scholar] [CrossRef]
  2. Friedman, F.A. Friedman Doctrine—The Social Responsibility of Business Is to Increase Its Profits. The New York Times Magazine, 13 September 1970. Available online: https://www.nytimes.com/1970/09/13/archives/a-friedman-doctrine-the-social-responsibility-of-business-is-to.html(accessed on 10 July 2021).
  3. Freeman, R.E. Strategic Management: A Stakeholder Perspective; Prentice-Hall: Englewood Cliffs, NJ, USA, 1984. [Google Scholar]
  4. Issa, T.; Issa, T. Changing the students’ mind-set via sustainability. In Sustainability, Green IT and Education Strategies in the Twenty-First Century; Issa, T., Isaias, P., Issa, T., Eds.; Springer: Cham, Switzerland, 2017; pp. 1–15. [Google Scholar]
  5. Elkington, J. Cannibals with Forks. The Triple Bottom Line of 21st Business Century; Capstone Publishing Limited—Oxford Centre for Innovation: Oxford, UK, 1997. [Google Scholar]
  6. Margret, J.; Hoque, Z. Business continuity in the face of fraud and organisational change. Aust. Account. Rev. 2016, 26, 21–33. [Google Scholar] [CrossRef]
  7. Montesdeoca, M.; Medina, A.; Santana, F. Research topics in accounting fraud in the 21st century: A state of the art. Sustainability 2019, 11, 1570. [Google Scholar] [CrossRef] [Green Version]
  8. Martínez-Ferrero, J.; Prado-Lorenzo, J.M.; Fernández-Fernández, J.M. Responsabilidad social corporativa vs. responsabilidad contable. Rev. Contab.-Span. Account. Rev. 2013, 16, 32–45. [Google Scholar] [CrossRef] [Green Version]
  9. Jan, C.L. An effective financial statements fraud detection model for the sustainable development of financial markets: Evidence from Taiwan. Sustainability 2018, 10, 513. [Google Scholar] [CrossRef] [Green Version]
  10. Leung, P.; Cooper, B.J.; Robertson, P.T. The Role of Internal Audit in Corporate Governance & Management; RMIT Publishing: Melbourne, Australia, 2004. [Google Scholar]
  11. Nicolăescu, E. Internal auditors’ role in detecting fraud. Contemp. Read. Law Soc. Justice 2013, 5, 106–111. [Google Scholar]
  12. Shapiro, D. COSO embraces enhanced fraud risk management. J. Corp. Account. Financ. 2014, 25, 33–38. [Google Scholar] [CrossRef]
  13. Westhausen, H.-U. The escalating relevance of internal auditing as anti-fraud control. J. Financ. Crime 2017, 24, 322–328. [Google Scholar] [CrossRef]
  14. Demirović, L.; Isaković-Kaplan, Š.; Proho, M. Internal audit risk assessment in the function of fraud detection. J. Forensic Account. Prof. 2021, 1, 35–49. [Google Scholar] [CrossRef]
  15. Becker, G.S. Human Capital: A Theoretical and Empirical Analysis, with Special Reference to Education, 3rd ed.; University of Chicago Press: Chicago, IL, USA, 1993. [Google Scholar]
  16. Ployhart, R.E.; Moliterno, T.P. Emergence of the human capital resource: A multilevel model. Acad. Manag. Rev. 2011, 36, 127–150. [Google Scholar] [CrossRef]
  17. Samagaio, A.; Rodrigues, R. Human capital and performance in young audit firms. J. Bus. Res. 2016, 69, 5354–5359. [Google Scholar] [CrossRef]
  18. Meredith, K.; Blake, J.; Baxter, P.; Kerr, D. Drivers of and barriers to decision support technology use by financial report auditors. Decis. Support Syst. 2020, 139, 113402. [Google Scholar] [CrossRef]
  19. The Institute of Internal Auditors. International Standards for the Professional Practice of Internal Auditing. Available online: https://na.theiia.org/standards-guidance/public%20documents/ippf-standards-2017.pdf (accessed on 20 November 2021).
  20. Henderson, D.L., III; Bradford, M.; Kotb, A. Inhibitors and enablers of GAS usage: Testing the dual factor theory. J. Inf. Syst. 2016, 30, 135–155. [Google Scholar] [CrossRef]
  21. Ariwa, E.; Olasanmi, O.O.; Mauri, J.L. Green communication and corporate sustainability of computer aided audit techniques and fraud detection. In Computer Science and its Applications. Lecture Notes in Electrical Engineering; Yeo, S.S., Pan, Y., Lee, Y., Chang, H., Eds.; Springer: Dordrecht, The Netherlands, 2012; Volume 203, pp. 843–862. [Google Scholar]
  22. Hudson, M.E. CAATs and compliance. Intern. Audit. 1998, 55, 25–27. [Google Scholar]
  23. Coderre, D.G. Computer assisted fraud detection. Intern. Audit. 2000, 57, 25–27. [Google Scholar]
  24. Paukowits, F. Bridging CAATTS and risk. Intern. Audit. 2000, 57, 27–29. [Google Scholar]
  25. Bistrova, J.; Lace, N. Defining key factors to sustain maximum shareholder value. J. Financ. Stud. Res. 2012, 2012, 1–14. [Google Scholar] [CrossRef] [Green Version]
  26. Elkington, J. Governance for sustainability. Corp. Gov. 2006, 14, 522–529. [Google Scholar] [CrossRef]
  27. Atu, O.; Adeghe, R.; Atu, O.-E. Internal control as a potential instrument for corporate governance. IOSR J. Econ. Financ. (IOSR-JEF) 2014, 2, 66–70. [Google Scholar]
  28. Nogueira, M.C. Risco de fraude nas empresas. In Fraude em Portugal–Causas e Contextos; Pimenta, C., Maia, A.J., Sousa, B., Eds.; Almedina: Coimbra, Portugal, 2017; pp. 37–58. [Google Scholar]
  29. Rossouw, G.J. Business ethics and corporate governance: A global survey. Bus. Soc. 2005, 44, 32–39. [Google Scholar] [CrossRef]
  30. Walker, A.; Sanjuan, F. Responsabilidad social corporativa: ¿ papel mojado o necesidad estratégica? Harv. Deusto Bus. Rev. 2008, 164, 19–36. [Google Scholar]
  31. Sawangarreerak, S.; Thanathamathee, P. Detecting and analyzing fraudulent patterns of financial statement for open innovation using discretization and association rule mining. J. Open Innov. Technol. Mark. Complex. 2021, 7, 128. [Google Scholar] [CrossRef]
  32. Hazar, H.B. New paradigm in auditing: Continuous auditing. In Ethics and Sustainability in Accounting and Finance; Çalıyurt, K., Ed.; Springer: Singapore, 2021; Volume II, pp. 253–268. [Google Scholar]
  33. Jackson, P.M. Debate: Fraud risk management in the public sector. Public Money Manag. 2013, 33, 6–8. [Google Scholar] [CrossRef]
  34. Yu, S.J.; Rha, J.S. Research trends in accounting fraud using network analysis. Sustainability 2021, 13, 5579. [Google Scholar] [CrossRef]
  35. Margret, J.E.; Peck, G. Fraud in Financial Statements; Routledge: London, UK, 2015. [Google Scholar]
  36. Ramamoorti, S. Internal Auditing: History, Evolution, and Prospects. Books and Book Chapters by University of Dayton Faculty. 30. Available online: https://ecommons.udayton.edu/books/30 (accessed on 2 August 2021).
  37. Flesher, D.L. Internal Auditing Standards and Practices: Instructor’s Guide: A One-Semester Course; The Institute of Internal Auditors: Altamonte Springs, FL, USA, 1996. [Google Scholar]
  38. Vadasi, C.; Bekiaris, M.; Andrikopoulos, A. Corporate governance and internal audit: An institutional theory perspective. Corp. Gov. 2019, 20, 175–190. [Google Scholar] [CrossRef]
  39. Lin, S.; Pizzini, M.; Vargus, M.; Bardhan, I. The role of internal audit function in the disclosure of material weaknesses. Account. Rev. 2011, 86, 287–323. [Google Scholar] [CrossRef]
  40. Drogalas, G.; Pantelidis, P.; Vouroutzidou, R.; Kesisi, E. Assessment of corporate governance via internal audit. In Proceedings of the 7th International Conference on New Horizons in Industry & Education, Chios, Greece, 25–26 August 2011; pp. 333–337. [Google Scholar]
  41. Drogalas, G.; Arampatzis, K.; Anagnostopoulou, E. The relationship between corporate governance, internal audit and audit committee: Empirical evidence from Greece. Corp. Ownersh. Control. 2016, 14, 569–577. [Google Scholar] [CrossRef] [Green Version]
  42. Vadasi, C.; Bekiaris, M.; Andrikopoulos, A. Internal audit function quality and corporate governance: The case of Greece. Multinatl. Financ. J. 2021, 25, 1–61. [Google Scholar]
  43. Cohen, J.; Krishnamoorthy, G.; Wright, A. The corporate governance mosaic and financial reporting quality. J. Account. Lit. 2004, 23, 87–152. [Google Scholar]
  44. Sarens, G.; Abdolmohammadi, M.; Lenz, R. Factors associated with the internal audit function’s role in corporate governance. J. Appl. Account. Res. 2012, 13, 191–204. [Google Scholar] [CrossRef]
  45. Al-Najjar, B. Corporate governance and audit features: SMEs evidence. J. Small Bus. Enterp. Dev. 2018, 25, 163–179. [Google Scholar] [CrossRef] [Green Version]
  46. Ramamoorti, S.; Weidenmier, M. The Pervasive Impact of Information Technology on Internal Auditing. Books and Book Chapters by University of Dayton Faculty. 38. Available online: https://ecommons.udayton.edu/books/38 (accessed on 2 August 2021).
  47. Singleton, T.W.; Singleton, A.J.; Bologna, G.J.; Lindquist, R.J. Fraud Auditing and Forensic Accounting, 3rd ed.; John Wiley & Sons: Hoboken, NJ, USA, 2006. [Google Scholar]
  48. Mahzan, N.; Lymer, A. Adoption of computer assisted audit tools and techniques (CAATTs) by internal auditors: Current issues in the UK. In Proceedings of the British Accounting Association Annual Conference, Blackpool, UK, 1–3 April 2008. [Google Scholar]
  49. Li, H.; Dai, J.; Gershberg, T.; Vasarhelyi, M. Understanding usage and value of audit analytics for internal auditors: An organizational approach. Int. J. Account. Inf. Syst. 2018, 28, 59–76. [Google Scholar] [CrossRef]
  50. Bierstaker, J.; Janvrin, D.; Lowe, D.J. What factors influence auditors’ use of computer-assisted audit techniques? Adv. Account. 2014, 30, 67–74. [Google Scholar] [CrossRef]
  51. Mansour, E.M. Factors affecting the adoption of computer assisted audit techniques in audit process: Findings from Jordan. Bus. Econ. Res. 2016, 6, 248–271. [Google Scholar] [CrossRef]
  52. Sumritsakun, C. Antecedent and consequence of CAATs implement success in internal audit: Case study of Thai-listed companies. Rev. Bus. Res. 2013, 13, 111–118. [Google Scholar] [CrossRef]
  53. Power, M. The apparatus of fraud risk. Account. Organ. Soc. 2013, 38, 525–543. [Google Scholar] [CrossRef]
  54. Smidt, L.; Ahmi, A.; Steenkamp, L.; van der Nest, D.; Lubbe, D. A maturity-level assessment of generalised audit software: Internal audit functions in Australia. Aust. Account. Rev. 2019, 29, 516–531. [Google Scholar] [CrossRef]
  55. Christensen, J.A.; Byington, J.R. The computer: An essential fraud detection tool. J. Corp. Account. Financ. 2003, 14, 23–27. [Google Scholar] [CrossRef]
  56. Cahyono, Y.T.; Putri, D.A.; Nurharjanti, N.N. The audit experience as a moderating the effect of e-audit implementation and the audit’s working environment on the quality of audit findings in the fraud auditing. Ris. Akunt. Keuang. Indones. 2021, 5, 313–322. [Google Scholar]
  57. Pereira, A.C.; do Nascimento, W.S. Um estudo sobre a atuação da auditoria interna na detecção de fraudes nas empresas do setor privado no Estado de São Paulo. Rev. Bras. Gestão Negócios 2005, 7, 46–56. [Google Scholar]
  58. Bradford, M.; Henderson, D.; Baxter, R.J.; Navarro, P. Using generalized audit software to detect material misstatements, control deficiencies and fraud: How financial and IT auditors perceive net audit benefits. Manag. Audit. J. 2020, 35, 521–547. [Google Scholar] [CrossRef]
  59. Olasanmi, O.O. Computer aided audit techniques and fraud detection. Res. J. Financ. Account. 2013, 4, 67–80. [Google Scholar]
  60. Ganesan, Y.; Hwa, Y.W.; Jaafar, A.H.; Hashim, F. Corporate governance and sustainability reporting practices: The moderating role of internal audit function. Glob. Bus. Manag. Res. 2017, 9, 159–179. [Google Scholar]
  61. Vasilyeva, T.; Makarenko, I.O. The role of innovation in corporate reporting in the transformation of accounting method’s elements. In Managing Economic Growth: Marketing, Management, and Innovations; Illiashenko, S.M., Strielkowski, W., Eds.; Prague Institute for Qualification Enhancement: Prague, Czech Republic, 2016; pp. 171–179. [Google Scholar]
  62. Cohen, A.; Sayag, G. The effectiveness of internal auditing: An empirical examination of its determinants in Israeli organisations. Aust. Account. Rev. 2010, 20, 296–307. [Google Scholar] [CrossRef]
  63. Goodwin, J. A comparison of internal audit in the private and public sectors. Manag. Audit. J. 2004, 19, 640–650. [Google Scholar] [CrossRef]
  64. Lartey, P.; Kong, Y.; Bah, F.; Santosh, R.; Gumah, I. Determinants of internal control compliance in public organizations; using preventive, detective, corrective and directive controls. Int. J. Public Adm. 2020, 43, 711–723. [Google Scholar] [CrossRef]
  65. Spraakman, G. Canadian internal audit practices: A comparison of profit-pursuing and government organizations. Optimum 1985, 16, 85–92. [Google Scholar]
  66. Thomas, R.L. A Chairman’s view of internal audit. Bank Manag. 1996, 72, 28. [Google Scholar]
  67. Araj, F.G. Responding to Fraud Risk: Exploring Where Internal Auditing Stands. The Global Internal Audit Common Body of Knowledge; The Institute of Internal Auditors Research Foundation: Altamonte Springs, FL, USA, 2015. [Google Scholar]
  68. Association of Certified Fraud Examiners. Report to the Nations: 2020 Global Study on Occupational Fraud and Abuse; ACFE: Austin, TX, USA, 2020. [Google Scholar]
  69. Ahmi, A.; Saidin, S.; Abdullah, A. IT adoption by internal auditors in public sector: A conceptual study. Procedia-Soc. Behav. Sci. 2014, 164, 591–599. [Google Scholar] [CrossRef] [Green Version]
  70. Bănărescu, A. Detecting and preventing fraud with data analytics. Procedia Econ. Financ. 2015, 32, 1827–1836. [Google Scholar] [CrossRef] [Green Version]
  71. Piper, A. Auditing the Public Sector: Managing Expectations, Delivering Results. The Global Internal Audit Common Body of Knowledge; The Institute of Internal Auditors Research Foundation: Altamonte Springs, FL, USA, 2015. [Google Scholar]
  72. Lee, G.; Xia, W. Organisational size and IT innovation adoption: A meta-analysis. Inf. Manag. 2006, 43, 975–985. [Google Scholar] [CrossRef]
  73. Center for Financial Reporting Reform. Public Sector Internal Audit: Focus on Fraud; World Bank Group: Washington, DC, USA, 2017. [Google Scholar]
  74. Seago, J. Delivering on the Promise: Measuring Internal Audit Value and Performance. The Global Internal Audit Common Body of Knowledge; The Institute of Internal Auditors Research Foundation: Altamonte Springs, FL, USA, 2015. [Google Scholar]
  75. Telino, V.; Massa, R.; Mota, I.; Gomes, A.; Moreira, F.A. Methodology for creating a macro action plan to improve IT use and its governance in organizations. Information 2020, 11, 427. [Google Scholar] [CrossRef]
  76. Ahmi, A.; Kent, S. The utilisation of generalized audit software (GAS) by external auditors. Manag. Audit. J. 2013, 28, 88–113. [Google Scholar] [CrossRef]
  77. Daoud, L.; Marei, A.; Al-Jabaly, S.; Aldaas, A. Moderating the role of top management commitment in usage of computer-assisted auditing techniques. Accounting 2021, 7, 457–468. [Google Scholar] [CrossRef]
  78. Rosli, K.; Yeow, P.; Siew, E.-G. Adoption of audit technology in audit firms. In Proceedings of the 24th Australasian Conference on Information Systems, Melbourne, Australia, 4–6 December 2013. [Google Scholar]
  79. Abou-El-Sood, H.; Kotb, A.; Allam, A. Exploring auditors’ perceptions of the usage and importance of audit information technology. Int. J. Audit. 2015, 19, 252–266. [Google Scholar] [CrossRef]
  80. Pedrosa, I.; Costa, C. Statutory auditor’s profile and computer assisted audit tools and techniques’ acceptance: Indicators on firms and peers’ influence. In Proceedings of the 2014 Workshop on Information Systems and Design of Communication, Association for Computing Machinery, Lisbon, Portugal, 16–17 May 2014; pp. 20–26. [Google Scholar]
  81. Barnes, P.; Webb, J. Organisational susceptibility to fraud and theft, organizational size and the effectiveness of management controls: Some UK evidence. Manag. Decis. Econ. 2007, 28, 181–193. [Google Scholar] [CrossRef]
  82. Widuri, R.; O’Connell, B.; Yapa, P.W.S. Adopting generalized audit software: An Indonesian perspective. Manag. Audit. J. 2016, 31, 821–847. [Google Scholar] [CrossRef]
  83. Kummer, T.-F.; Singh, K.; Best, P. The effectiveness of fraud detection instruments in not-for-profit organizations. Manag. Audit. J. 2015, 30, 435–455. [Google Scholar] [CrossRef]
  84. Hoonakker, P.; Carayon, P. Questionnaire survey nonresponse: A comparison of postal mail and internet surveys. Intl. J. Hum.-Comput. Interact. 2009, 25, 348–373. [Google Scholar] [CrossRef]
  85. Hair, J.F.; Hult, G.T.M.; Ringle, C.; Sarstedt, M. A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM); Sage Publications: Los Angeles, CA, USA, 2017. [Google Scholar]
  86. Armstrong, J.S.; Overton, T.S. Estimating nonresponse bias in mail surveys. J. Mark. Res. 1977, 14, 396–402. [Google Scholar] [CrossRef] [Green Version]
  87. Podsakoff, P.M.; MacKenzie, S.B.; Lee, J.Y.; Podsakoff, N.P. Common method biases in behavioural research: A critical review of the literature and recommended remedies. J. Appl. Psychol. 2003, 88, 879–903. [Google Scholar] [CrossRef] [PubMed]
  88. Fuller, C.M.; Simmering, M.J.; Atinc, G.; Atinc, Y.; Babin, B.J. Common methods variance detection in business research. J. Bus. Res. 2016, 69, 3192–3198. [Google Scholar] [CrossRef]
  89. Jakšić, D. Implementation of computer assisted audit techniques in application controls testing. Manag. Inf. Syst. 2009, 4, 9–12. [Google Scholar]
  90. Serpeninova, Y.; Makarenko, S.; Litvinova, M. Computer-assisted audit techniques: Classification and implementation by auditor. Public Policy Account. 2020, 1, 44–49. [Google Scholar] [CrossRef]
  91. Baader, G.; Kremar, H. Reducing false positives in fraud detection: Combining the red flag approach with process mining. Int. J. Account. Inf. Syst. 2018, 31, 1–16. [Google Scholar] [CrossRef]
  92. Kim, H.; Mannino, M.; Nieschwietz, R. Information technology acceptance in the internal audit profession: Impact of technology features and complexity. Int. J. Account. Inf. Syst. 2009, 10, 214–228. [Google Scholar] [CrossRef]
  93. Pedrosa, I.; Costa, C.J.; Aparício, M. Determinants adoption of computer-assisted auditing tools (CAATs). Cogn. Technol. Work. 2020, 22, 565–583. [Google Scholar] [CrossRef]
  94. Hair, J.F.; Ringle, C.M.; Sarstedt, M. PLS-SEM: Indeed a silver bullet. J. Mark. Theory Pract. 2011, 19, 139–152. [Google Scholar] [CrossRef]
  95. Hair, J.F.; Risher, J.J.; Sarstedt, M.; Ringle, C.M. When to use and how to report the results of PLS-SEM. Eur. Bus. Rev. 2019, 31, 2–24. [Google Scholar] [CrossRef]
  96. Cachón-Rodríguez, G.; Blanco-González, A.; Prado-Román, C.; Diez-Martin, F. Sustainability actions, employee loyalty, and the awareness: The mediating effect of organization legitimacy. Manag. Decis. Econ. 2021, 42, 1730–1739. [Google Scholar] [CrossRef]
  97. Hulland, J. Use of partial least squares (PLS) in strategic management research: A review of four recent studies. Strateg. Manag. J. 1999, 20, 195–204. [Google Scholar] [CrossRef]
  98. Cangemi, M.P. Staying a Step Ahead: Internal Audit’s Use of Technology. The Global Internal Audit Common Body of Knowledge; The Institute of Internal Auditors Research Foundation: Altamonte Springs, FL, USA, 2015. [Google Scholar]
  99. Fornell, C.G.; Larcker, D.F. Evaluating structural equation models with unobservable variables and measurement error. J. Mark. Res. 1981, 18, 39–50. [Google Scholar] [CrossRef]
  100. Venkatesh, V.; Morris, M.; Davis, G.; Davis, F. User acceptance of information technology: Toward a unified view. MIS Q. 2003, 27, 425–478. [Google Scholar] [CrossRef] [Green Version]
  101. Davis, F.D., Jr. A Technology Acceptance Model for Empirically Testing New End-user Information Systems: Theory and Results (Doctoral Dissertation); Massachusetts Institute of Technology: Cambridge, MA, USA, 1986. [Google Scholar]
  102. Ajzen, I. The theory of planned behavior. Organ. Behav. Hum. Decis. Processes 1991, 50, 179–211. [Google Scholar] [CrossRef]
  103. Rogers, E.M. Diffusion of Innovations, 4th ed.; Free Press: New York, NY, USA, 1995. [Google Scholar]
  104. Tornatzky, L.; Fleischer, M.; Chakrabarti, A. Processes of Technological Innovation; Lexington Books: Lexington, MA, USA, 1990. [Google Scholar]
  105. Shamsuddin, A.; Rajasharen, L.; Maran, D.; Ameer, M.F.M.; Muthu, P. Factors influencing usage level of computer assisted audit techniques (CAATs) by internal auditors in Malaysia. In Proceedings of the 6th Kuala Lumpur International Business, Economics and Law Conference, Kuala Lumpur, Malaysia, 18–19 April 2015. [Google Scholar]
  106. Lou, Y.-I.; Wang, M.-L. Fraud risk factor of the fraud triangle assessing the likelihood of fraudulent financial reporting. J. Bus. Econ. Res. 2009, 7, 61–78. [Google Scholar] [CrossRef] [Green Version]
  107. Strahan, R.; Gerbasi, K.C. Short, homogeneous versions of the Marlow-Crowne social desirability scale. J. Clin. Psychol. 1972, 28, 191–193. [Google Scholar] [CrossRef]
  108. Camisón-Zornoza, C.; Lapiedra-Alcamí, R.; Segarra-Ciprés, M.; Boronat-Navarro, M. A Meta-analysis of innovation and organizational size. Organ. Stud. 2004, 25, 331–361. [Google Scholar] [CrossRef]
Figure 1. Research framework.
Figure 1. Research framework.
Sustainability 14 00705 g001
Table 1. Types of CAATs used.
Table 1. Types of CAATs used.
MeanMedianSDSkewness
CAATs—overall3.554.000.964−0.499
Specific CAATs:
Generic personal productivity tools (e.g., Word, PowerPoint)4.695.000.815−3.532
Database management system3.254.001.469−0.450
ActiveData for Excel3.233.501.640−0.311
Firm-tailored audit software3.104.001.724−0.165
Program analysis techniques (e.g., process mapping software and flowcharts)2.663.001.5410.134
Database SQL search2.452.001.4290.463
Online public database2.442.001.5470.479
Microsoft Access2.262.001.3450.672
Statistical software (e.g., SPSS)2.071.001.3340.849
ACL—Audit Command Language1.961.001.4271.080
TeamMate1.851.001.3631.352
Techniques for continuous or recurrent testing (e.g., embedded audit modules)1.831.001.2821.354
Working Papers software (e.g., CaseWare Working Papers)1.821.001.4411.370
IDEA—interactive data extraction and analysis1.791.001.3351.555
Program testing techniques (test data, integrated test facility, parallel simulation, controlled reprocessing)1.761.001.2011.408
Bwise1.741.001.3371.727
Text recovery software1.661.001.1431.598
Data-mining tools (e.g., DBMiner, XLMiner, or WEKA)1.371.000.9382.888
Erase fraud manager1.101.000.4635.529
Table 2. Descriptive statistics.
Table 2. Descriptive statistics.
Construct/ItemsMeanMedianSDSkewnessConstructs/ItemsMeanMedianSDSkewness
CAAT_USE5.075.371.375−1.166FRAUD4.144.501.986−0.354
Risk_errors5.236.001.952−1.090Kickback4.105.002.312−0.194
Risk_fraud4.925.001.942−0.769Rigging3.283.002.1000.270
Detect_errors5.426.001.844−1.298Shell4.185.002.383−0.217
Detect_fraud4.925.002.069−0.704Double5.006.002.314−0.857
Unexp_relation5.406.001.852−1.161Pass4.125.002.322−0.225
Material4.575.002.061−0.447Accomplice3.954.002.251−0.128
Work_program4.805.001.947−0.749Personal4.345.002.206−0.370
Evidence_cont5.246.001.853−1.138OWNER0.80 0.403
Sample5.726.001.776−1.618ENTITY_SIZE0.75 0.437
Repeat5.426.002.010−1.283
Going_concern3.954.001.987−0.233
Extract_records5.756.001.694−1.628
Reperform4.955.002.029−0.912
Extract_data5.356.001.821−1.188
Missing5.536.001.741−1.452
Benford3.634.002.1070.034
Sort_data5.306.001.853−1.251
Population5.496.001.872−1.365
Accuracy5.356.001.783−1.220
Stratify5.536.001.741−1.492
Match_data5.536.001.691−1.383
Data_sum5.386.001.757−1.292
Descriptive4.595.002.156−0.541
Cross_data5.306.001.977−1.169
Ratio5.126.002.059−1.066
Sequence5.106.002.006−0.872
Mining4.155.002.238−0.291
Tendency5.056.001.863−1.018
Visualization5.706.001.555−1.549
Relationship4.365.002.192−0.384
Cluster4.515.002.197−0.473
Table 3. Summary of the Mann–Whitney tests based on the organizational context.
Table 3. Summary of the Mann–Whitney tests based on the organizational context.
ConstructsHypothesisOwnerEntity_Size
FRAUDDistribution is the sameKickback, Rigging, Pass, AccompliceAll items
Distribution is differentShell, Double, Personal, FRAUD
CAAT_USEDistribution is the sameRisk_errors, material, work_program, evidence_cont, going_concern, extract_data, benford, data_sum, descriptive, cross_data, ratio, sequence, mining, tendency, visualization, relationship, cluster, CAAT_USERemaining items
Distribution is differentRisk_fraud, detect_erros, detect_fraud, unexp_relation, sample, repeat, extract_records, reperform, missing, sort_data, population, accuracy, stratify, match_dataDetect_fraud
Test with a significance level of 5%.
Table 4. Measurement model.
Table 4. Measurement model.
ConstructItemLoadingsCronbach’s AlphaComposite ReliabilityAverage Variance Extracted
FRAUD 0.9480.9580.765
Kickback0.868
Rigging0.780
Shell0.934
Double0.859
Pass0.918
Accomplice0.900
Personal0.842
CAAT_USE 0.9720.9740.647
Risk_fraud0.787
Detect_errors0.844
Detect_fraud0.865
Unexp_relation0.742
Sample0.737
Repeat0.841
Extract_records0.855
Reperform0.733
Extract_data0.787
Missing0.875
Sort_data0.879
Population0.785
Accuracy0.894
Stratify0.875
Match_data0.827
Data_sum0.821
Cross_data0.707
Sequence0.716
Tendency0.700
Visualization0.765
Cluster0.739
Table 5. Discriminant validity.
Table 5. Discriminant validity.
Panel A: Correlation MatrixPanel B: HTMT
FRAUDUSE FRAUD
FRAUD0.874 USE0.681
USE0.6690.804
Note: Diagonal values in Panel A represent the square root of AVE.
Table 6. Structural model assessment of model without moderator.
Table 6. Structural model assessment of model without moderator.
Dependent VariableR2Q2
FRAUD0.4480.33
RelationPath coefficientt-valuep-value
CAAT_USE -> FRAUD0.6839.6390.000
Table 7. Structural model assessment of model with moderators.
Table 7. Structural model assessment of model with moderators.
Dependent VariableR2Q2 Dependent VariableR2Q2
FRAUD0.4500.330 FRAUD0.4730.344
RelationPath coefficientt-valuep-valueRelationPath coefficientt-valuep-value
CAAT_USE -> FRAUD0.6938.5030.000CAAT_USE -> FRAUD0.6887.4290.000
CAAT_USE * ENTITY_SIZE -> FRAUD0.0440.5360.592CAAT_USE * OWNER -> FRAUD0.1440.9070.364
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Samagaio, A.; Diogo, T.A. Effect of Computer Assisted Audit Tools on Corporate Sustainability. Sustainability 2022, 14, 705. https://doi.org/10.3390/su14020705

AMA Style

Samagaio A, Diogo TA. Effect of Computer Assisted Audit Tools on Corporate Sustainability. Sustainability. 2022; 14(2):705. https://doi.org/10.3390/su14020705

Chicago/Turabian Style

Samagaio, António, and Tiago Andrade Diogo. 2022. "Effect of Computer Assisted Audit Tools on Corporate Sustainability" Sustainability 14, no. 2: 705. https://doi.org/10.3390/su14020705

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop