Open Access

Readiness of Low Complexity ERP for Continuous Auditing in SMEs: The Brazilian Case Study


Cite

Alaküla, M. L. and Matulevičius, R. (2015, November) An experience report of improving business process compliance using security risk-oriented patterns. In: IFIP Working Conference on The Practice of Enterprise Modeling, 271-285. Springer, Cham.Search in Google Scholar

Alles, M. G., Brennan, G., Kogan, A. and Vasarhelyi, M. A. (2006a) Continuous monitoring of business process controls: A pilot implementation of a continuous auditing system at Siemens. International Journal of Accounting Information Systems, 7(2), 137-161.Search in Google Scholar

Alles, M. G., Tostes, F., Vasarhelyi, M. A. and Riccio, E. L. (2006b) Continuous auditing: the USA experience and considerations for its implementation in Brazil. JISTEM - Journal of Information Systems and Technology Management, 3 (2), 211-224.Search in Google Scholar

Alles, M. G., Kogan, A. and Vasarhelyi, M. A. (2008) Putting continuous auditing theory into practice: Lessons from two pilot implementations. Journal of Information Systems, 22(2), 195-214.Search in Google Scholar

Antunes, M. T. P., Imoniana, J. O., Formigoni, H. and Alves, A. S. (2010) Preparedness of ERP systems to create intangible managerial accounting information: evidence from Brazil. International Journal of Economics and Accounting, 1 (4), 375-390.Search in Google Scholar

Bagheri, A. and Hjorth, P. (2005) Monitoring for sustainable development: Systemic framework. Int. J. of Sustainable Development, 8(4), 280-301.Search in Google Scholar

Baker, W. E., Grinstein, A. and Harmancioglu, N. (2016) Whose innovation performance benefits more from external networks: entrepreneurial or conservative firms? Journal of Product Innovation Management, 33(1), 104-120.Search in Google Scholar

Batra, S., Sharma, S., Dixit, M. R., Vohra, N. and Gupta, V. K. (2015) Performance implications of industry appropriability for manufacturing SMEs. Journal of Manufacturing Technology Management, 26(5), 660-677.Search in Google Scholar

Best, P. J., Rikhardsson, P. and Toleman, M. (2009) Continuous fraud detection in enterprise systems through audit trail analysis. Journal of Digital Forensics, Security and Law, 4(1), 1-6.Search in Google Scholar

Bierstaker, J., Janvrin, D. and Lowe, D. J. (2014) What factors influence auditors’ use of computer-assisted audit techniques? Advances in Accounting, 30(1), 67-74.Search in Google Scholar

Blessing, L. T. M. (1994) A process-based approach to computer-support engineering design. Dissertation, University of Twente, ISBN 0.9523504.0.8, Enschede. 369 pp.Search in Google Scholar

Brennan, G. and Teeter, R. (2010) Aiding the Audit: Using the IT Audit as a Springboard for Continuous Controls Monitoring. Available at SSRN: https://ssrn.com/abstract=1668743 or http://dx.doi.org/10.2139/ssrn.1668743Search in Google Scholar

Brown, C. E., Wong, J. A. and Baldwin, A. A. (2007) A review and analysis of the existing research streams in continuous auditing. Journal of Emerging Technologies in Accounting, 4(1), 1-28.Search in Google Scholar

Bumgarner, N. and Vasarhelyi, M. (2015) Auditing—A New View. Audit analytics3(1), 2015.Search in Google Scholar

Cahen, F. R., Lahiri, S. and Borini, F. M. (2016) Managerial perceptions of barriers to internationalization: An examination of Brazil’s new technology-based firms. Journal of Business Research, 69(6), 1973-1979.Search in Google Scholar

Clausing, D. and Holmes, M. (2010) Technology readiness. Research-Technology Management, 53(4), 52-59.Search in Google Scholar

COSO - Committee of Sponsoring Organizations of the Treadway Commission (2013). Internal Control-Integrated Framework.Search in Google Scholar

Coyte, R., Ricceri, F. and Guthrie, J. (2012) The management of knowledge resources in SMEs: an Australian case study. Journal of Knowledge Management, 16(5), 789-807.Search in Google Scholar

Daniels, B. W., Ellis, Y. and Gupta, R. D. (2013) Accounting educators and practitioners’ perspectives on fraud and forensic topics in the accounting curriculum. Journal of Legal, Ethical and Regulatory Issues, 16(2), 93.Search in Google Scholar

Davidson, B. I., Desai, N. K. and Gerard, G. J. (2013) The effect of continuous auditing on the relationship between internal audit sourcing and the external auditor’s reliance on the internal audit function. Journal of Information Systems, 27(1), 41-59.Search in Google Scholar

Debreceny, R., Gray, G. L., Jun-Jin Ng, J., Lee, K. S.-P. and Yau, W.-F. (2005) Embedded audit modules in enterprise resource planning systems: Implementation and functionality. Journal of Information Systems, 19(2), 7–27.Search in Google Scholar

Deep, A., Guttridge, P., Dani, S. and Burns, N. (2008) Investigating factors affecting ERP selection in made-to-order SME sector. Journal of Manufacturing Technology Management, 19(4), 430-446. https://doi.org/ 10.1108/17410380810869905Search in Google Scholar

Denning, D. E. (1987) An Intrusion-Detection Model. IEEE Transactions on Software Engineering, 13(2), 222-232.Search in Google Scholar

DeZoort, F. T. and Harrison, P. D. (2018) Understanding auditors’ sense of responsibility for detecting fraud within organizations. Journal of Business Ethics, 149(4), 857-874.Search in Google Scholar

Eulerich, M. and Kalinichenko, A. (2018) The current state and future directions of continuous auditing research: An analysis of the existing literature. Journal of Information Systems, 32(3), 31-51.Search in Google Scholar

Ferraiolo, D. F., Barkley, J. F. and Kuhn, D. R. (1999) A role-based access control model and reference implementation within a corporate intranet. ACM Transactions on Information and System Security, 2(1), 34-64.Search in Google Scholar

Gershberg, T. (2016) Log4Audit: the application of logging in auditing and management. Doctoral dissertation, Rutgers University-Graduate School-Newark. Available at https://rucore.libraries.rutgers.edu/rutgers-lib/51554/PDF/1/play/Search in Google Scholar

Gómez-López, M. T., Gasca, R. M. and Pérez-Álvarez, J. M. (2015). Compliance validation and diagnosis of business data constraints in business processes at runtime. Information Systems, 48, 26-43.Search in Google Scholar

Gonzalez, G. C., Sharma, P. N. and Galletta, D. (2012) Factors influencing the planned adoption of continuous monitoring technology. Journal of Information Systems, 26(2), 53-69.Search in Google Scholar

Groomer, S. M. and Murthy, U. S. (1989) Continuous auditing of database applications: An embedded audit module approach. Journal of Information Systems, 3(2), 53-67.Search in Google Scholar

Guimarães, A. B. S., Carvalho, K. C. M. and Paixão, L. A. R. (2018) Micro, pequenas e médias empresas: conceitos e estatísticas. Revista Radar: tecnologia, produção e comércio exterior, 1(55), 21-26.Search in Google Scholar

Gupta, H., Aye, K. T., Balakrishnan, R., Rajagopal, S. and Nguwi, Y. Y. (2014) Formulating, implementing and evaluating ERP in small and medium scale industries. International Journal, 3(6).Search in Google Scholar

Gupta, J., Gregoriou, A. and Healy, J. (2015) Forecasting bankruptcy for SMEs using hazard function: To what extent does size matter? Review of Quantitative Finance and Accounting, 45(4), 845-869.Search in Google Scholar

Haddara, M. and Zach, O. (2012) ERP systems in SMEs: An extended literature review. International Journal of Information Science, 2(6), 106–116.Search in Google Scholar

Haynes, R. and Li, C. (2016) Continuous audit and enterprise resource planning systems: A case study of ERP rollouts in the Houston, TX oil and gas industries. Journal of Emerging Technologies in Accounting, 13(1), 171-179. https://doi.org/10.2308/jeta-51446Search in Google Scholar

Hevner, A. and Chatterjee, S. (2010) Design science research in information systems. In: Design Research in Information Systems. Springer, Boston, MA, 9-22.Search in Google Scholar

Illa, X. B., Franch, X. and Pastor, J. A. (2000) Formalising ERP selection criteria. In: Tenth International Workshop on Software Specification and Design. IWSSD-10 2000. IEEE, 115-122.Search in Google Scholar

Imoniana, J.O., Perera, L. C. J., Lima, F. G. and Antunes, M. T. P. (2011) The dialectic of Control Culture in SMEs: A Case study. International Journal of Business Strategy, 11(2), 39-48.Search in Google Scholar

Imoniana, J. O., Feitas, E. C. D. and Perera, L. C. J. (2016) Assessment of internal control systems to curb corporate fraud-evidence from Brazil. African Journal of Accounting, Auditing and Finance 5 (1), 1-24.Search in Google Scholar

Jans, M., Alles, M. G. and Vasarhelyi, M. A. (2014) A field study on the use of process mining of event logs as an analytical procedure in auditing. The Accounting Review, 89(5), 1751-1773.Search in Google Scholar

Jituri, S., Fleck, B. and Ahmad, R. (2018) A Methodology to Satisfy Key Performance Indicators for Successful ERP Implementation in Small and Medium Enterprises. International Journal of Innovation, Management and Technology, 9(2).Search in Google Scholar

Kim, Y. and Kogan, A. (2014) Development of an anomaly detection model for a bank’s transitory account system. Journal of Information Systems, 28(1), 145-165.Search in Google Scholar

Kobelsky, K. W. (2014) Conceptual Model for Segregation of Duties: Integrating Theory and Practice for Manual and IT-Supported Procedures. International Journal of Accounting Information Systems, 15(1), 304–322.Search in Google Scholar

Kogan, A., Alles, M. G., Vasarhelyi, M. A. and Wu, J. (2010) Analytical Procedures for Continuous Data Level Auditing: ContinuityEquations 1. Available at http://raw.rutgers.edu/docs/Innovations/Continuity%20 Equations.pdfSearch in Google Scholar

Kogan, A., Alles, M. G., Vasarhelyi, M. A. and Wu, J. (2014) Design and evaluation of a continuous data level auditing system. Auditing: A Journal of Practice & Theory, 33(4), 221-245.Search in Google Scholar

Kuhn, J. R. and Sutton, S. G. (2006) Learning from WorldCom: Implications for fraud detection through continuous assurance. Journal of Emerging Technologies in Accounting, 3(1), 61-80.Search in Google Scholar

Kuhn, J. R. and Sutton, S. G. (2010) Continuous Auditing in ERP System Environments: The Current State and Future Directions. Journal of Information Systems, 24(1), 91–112.Search in Google Scholar

Lee, C. H., Kim, Y. H. and Rhee, P. K. (2001) Web personalization expert with combining collaborative filtering and association rule mining techniques. Expert Systems with Applications, 21(3), 131-137.Search in Google Scholar

Lenz, R. and Hahn, U. (2015) A synthesis of empirical internal audit effectiveness literature pointing to new research opportunities. Managerial Auditing Journal, 30(1), 5-33.Search in Google Scholar

Li, S. H., Huang, S. M. and Lin, Y. C. G. (2007) Developing a continuous auditing assistance system based on information process models. Journal of Computer Information Systems, 48(1), 2-13.Search in Google Scholar

Li, H., Dai, J., Gershberg, T. and Vasarhelyi, M. A. (2018) Understanding usage and value of audit analytics for internal auditors: An organizational approach. International Journal of Accounting Information Systems, 28, 59-76.Search in Google Scholar

Lu, J. W. and Beamish, P. W. (2006) SME internationalization and performance: Growth vs. profitability. Journal of International Entrepreneurship, 4(1), 27–48.Search in Google Scholar

Ly, L. T., Maggi, F. M., Montali, M., Rinderle-Ma, S. and van Der Aalst, W. M. (2015) Compliance monitoring in business processes: Functionalities, application, and tool-support. Information Systems, 54, 209-234.Search in Google Scholar

Manolova, T. S., Manev, I. M. and Gyoshev, B. S. (2010) In good company: The role of personal and inter-firm networks for new-venture internationalization in a transition economy. Journal of World Business, 45(3), 257–265.Search in Google Scholar

Mokhitli, M. and Kyobe, M. (2019) Examining factors that impede internal auditors from leveraging information technology for continuous auditing. In: Proceedings of Conference on Information, Communications, Technology and Society (ICTAS), Durban, South Africa, 1-6.Search in Google Scholar

Muhrtala, T. O. and Ogundeji, M. (2013) Computerized accounting information systems and perceived security threats in developing economies: The Nigerian case. Universal Journal of Accounting and Finance, 1(1), 9-18.Search in Google Scholar

Mulig, L. and Prachyl, C. L. (2017) Identifying Red Flags in an Accounts Payable Environment: The Importance of Controls in the Detection of Fraudulent Activity. Journal of Forensic & Investigative Accounting, 9(3), 941-952.Search in Google Scholar

Munro, D. (2013) A Guide to SME Financing. Springer.Search in Google Scholar

OSI (2016) Open Source Initiative. Available at https://opensource.org/osdSearch in Google Scholar

Poba-Nzaou, P. and Raymond, L. (2011) Managing ERP system risk in SMEs: A multiple case study. Journal of Information Technology, 26(3), 170-192.Search in Google Scholar

Powell, D., Riezebos, J. and Strandhagen, J. O. (2013) Lean production and ERP systems in small-and medium-sized enterprises: ERP support for pull production. International Journal of Production Research, 51(2), 395-409.Search in Google Scholar

Rikhardsson, P. and Dull, R. (2016) An exploratory study of the adoption, application and impacts of continuous auditing technologies in small businesses. International Journal of Accounting Information Systems, 20, 26-37.Search in Google Scholar

Rikhardsson, P., Singh, K. and Best, P. (2019) Exploring Continuous Auditing Solutions and Internal Auditing: A Research Note. Journal of Accounting and Management Information Systems, 18(4), 614-639. https://doi.org/10.24818/jamis.2019.04006Search in Google Scholar

Santos, L. M., Silva, G. M. and Neves, J. A. B. (2011) Risk of Survival of Commercial Micro and Small Enterprises. Revista de Contabilidade e Organizações, 5(11), 107-124.Search in Google Scholar

Schultz, M. (2013) Enriching process models for business process compliance checking in ERP environments. In: Proceedings of International Conference on Design Science Research in Information Systems. Springer, Berlin.Search in Google Scholar

Shin, I. H., Lee, M. G. and Park, W. (2013) Implementation of the continuous auditing system in the ERP-based environment. Managerial Auditing Journal, 28(7), 592–627.Search in Google Scholar

Shin, M. S., Jeon, H. S., Ju, Y. W., Lee, B. J. and Jeong, S. P. (2015) Constructing RBAC based security model in u-healthcare service platform. The Scientific World Journal, 2015.Search in Google Scholar

Singh, K. H. et al. (2011) Proactive fraud detection in enterprise systems. In: Proceedings of the 2nd International Conference on Business and Information: Steering Excellence of Business Knowledge. University of Kelaniya, Faculty of Commerce and Management Studies.Search in Google Scholar

Singh, K. H. et al. (2013). Automating vendor fraud detection in enterprise systems. The Journal of Digital Forensics, Security and Law, 8(2), 7-28.Search in Google Scholar

Singh, K. H., Best, P. J., Bojilov, M. and Blunt, C. (2014) Continuous Auditing and Continuous Monitoring in ERP Environments: Case Studies of Application Implementations. Journal of Information Systems, 28(1), 287–310.Search in Google Scholar

Valarini, E. and Pohlmann, M. (2019) Organizational crime and corruption in Brazil; a case study of the “Operation Carwash” court records. International Journal of Law, Crime and Justice, 59, 1-15.Search in Google Scholar

Van der Aalst, W., Van Hee, K., Van der Werf, J. M., Kumar, A. and Verdonk, M. (2011) Conceptual model for online auditing. Decision Support Systems, 50(3), 636-647.Search in Google Scholar

Vasarhelyi, M. A., Alles, M. A. and Kogan A. (2004) Principles of analytic monitoring for continuous assurance. Journal of Emerging Technologies in Accounting, 1(1), 1-21.Search in Google Scholar

Vasarhelyi, M. A., Alles, M. G., Kuenkaikaew, S. and Littley, J. (2012) The acceptance and adoption of continuous auditing by internal auditors: A micro analysis. International Journal of Accounting Information Systems, 13(3), 267-281.Search in Google Scholar

Vaz, P. V. C. and Espejo, M. M. S. B. (2015) From text to context: management accounting use in micro and small companies under the theoretical perspective of Bakhtin. Revista de Contabilidade e Organzações, 9(24), 31-41.Search in Google Scholar

Veasey, T. J. and Dodson, S. J. (2014) Anomaly detection in application performance monitoring data. International Journal of Machine Learning and Computing, 4(2), 120.Search in Google Scholar

Wang, J., Shan, Z., Gupta, M. and Rao, H. R. (2019) A Longitudinal Study of Unauthorized Access Attempts on Information Systems: The Role of Opportunity Contexts. MIS Quarterly, 43(2).Search in Google Scholar

Wolter, C., Miseldine, P. and Meinel, C. (2009) Verification of Business Process Entailment Constraints Using SPIN. In: F. Massacci, S. T. Redwine Jr. and N. Zannone (eds.) ESSoS 2009 - LNCS 5429, Springer, 1-15.Search in Google Scholar

Xia, H. Et al. (2014) Role Refinement in Access Control: Model and Analysis. INFORMS Journal on Computing, 26(4), 866-884.Search in Google Scholar

Zadeh, A. H., Akinyemi, B. A., Jeyaraj, A. and Zolbanin, H. M. (2018) Cloud ERP Systems for Small-and-Medium Enterprises: A Case Study in the Food Industry. Journal of Cases on Information Technology, 20(4), 53-70.Search in Google Scholar