Determinants of Adoption of Computer Assisted Auditing Techniques: A Survey of Auditors in Kano State, Nigeria
DOI:
https://doi.org/10.33003/fujafr-2023.v1i3.72.146-161Keywords:
Computer Assisted Auditing Techniques, Performance Expectancy, Effort Expectancy, Facilitating Condition, Social InfluenceAbstract
Computer assisted auditing techniques (CAATs) have been identified as a necessary and sufficient conditions for an effective and qualitative audit report. This study analyzed the determinants of adoption of computer assisted auditing techniques with focus on auditors practicing in Kano, Nigeria. The study adopted survey method where 125 auditors were sampled from seventeen audit firms through a multi-stage sampling technique. The data was analyzed using econometric methods (Ordered Logit Regression) in line with the Unified Theory of Acceptance and Use of Technology (UTAUT). Performance expectancy and effort expectancy were found to be statistically significant determinants of auditors’ total intention to CAATs adoption and usage. However, facilitating condition and social influence were not significant in explaining the auditor’s total intention to CAATs adoption and usage. The study recommends that, audit firms should invest in technological tools and train auditors on computer tools. Also, the regulatory bodies should consider computer proficiency as part of the regulatory checks. This adoption and usage of CAATs will help the auditors to produce an effective and qualitative audit report.
References
Abubakar Hamid Danlami, Shri-Dewi Applanaidu & Rabiul Islam (2016). From Biomass Cooking Fuel Source to Modern Alternative for Bauchi State Households: A Preliminary Analysis, Biofuels, DOI: https://doi.org/10.1080/17597269.2016.1226724
AbuMusa, A.A. (2008). Information Technology and its Implications for Internal Auditing: An Empirical Study of Saudi Organizations. Managerial Auditing Journal 23: 438-466. DOI: https://doi.org/10.1108/02686900810875280
Adeyemo, K.A. (2012) Fraud in Nigerian Banks: Nature, Deep-Seated Causes, Aftermaths & Probable Remedies. Mediterranean Journal of Social Sciences Vol 3(2) ISSN 2039-2117.
Ahmad, A., Nidal, A., & Ezz, H. (2019). Factors that Influence the Use of Computer Assisted audit Techniques (CAATs) By Internal Auditors in Jordan. Academy of Accounting and Financial Studies Journal Volume 23, 3.
Ahmi, A., & Kent, S. (2013). The Utilization of Generalized Audit Software (GAS) by External Auditors. Managerial Auditing Journal, 28(2), 88-113.
AICPA, (2012). The Current State of Continuous Auditing and Continuous Monitoring. American Institute of Certified Public Accountants, Toronto.
AICPA, (2015). Audit Analytics and Continuous Audit: Looking Toward the Future. AICPA, New York.
Aidi, A, & Kent, S. (2012). The Utilization of Generalized Audit Software (GAS) by External Auditors, Managerial Auditing Journal, Vol. 28 Iss 2 pp. 88 – 113 DOI: https://doi.org/10.1108/02686901311284522
Aidi, A., Siti, Z. S., Akilah, A. (2014). IT Adoption by Internal Auditors in Public Sector: A Conceptual Study. International Conference on Accounting Studies, 18-19, Kuala, Lumpur, Malaysia.
Al- Farah, A., Abbadi, S., & AL-Shaar, E. (2015). The Accounting and Auditing Profession in Jordan: Its Origin and Development. Developing Country Studies, 5, 167-179.
Appah, E., Ogbonna, G.N and Enebraye, Z. P. (2013). Auditors’ Usage of Computer Assisted Auditing Tools and Techniques: Empirical Evidence from Nigeria. Research Journal of Applied Sciences, Engineering and Technology 6(2): 187-195 DOI: https://doi.org/10.19026/rjaset.6.4057
Applebaun, S. & Nehmer, R. (2016). Using Drones in Internal and External Audits: An Exploratory Framework. Presentation at the 38th World continuous auditing and reporting symposium, Newark NJ. November 5.
Arens, A. A., Elder, R. J., & Beasley, M. S. (2012). Auditing and Assurance Services: An Integrated Approach. Prentice Hall.
Arnold, V. & Sutton, S. (1998). The Theory of Technology Dominance: Understanding the Impact of Intelligent Decision Aid on Decision Makers Judgements. Advances in Accounting Behavioural Research, 1, 175-194.
Bauguess, S. (2016). Has Big Data Made Us Lazy? Speech to the Midwest Region Meeting- American Accounting Association (AAA), Chicago, Illinois, October 21.
Bedard, J., Ettredge, M., Jackson, C., and Johnstone, M. (2002). The Effect of Technological Knowledge and Task Knowledge on Professional User Acceptance of an Electronic Work System.
Bierstaker J.L., Janvrin, D.J. and Lowe, D.J. (2009). An Investigation of Factors Influencing the Use of Computer Related Audit Procedures. Journal. Information. Systems, 23(1): 97. DOI: https://doi.org/10.2308/jis.2009.23.1.97
Bierstaker, J., Janvrin, D. D. & Lowe, J. (2014). What Factors Influence Auditors' Use of Computer-Assisted Audit Techniques? Advances in Accounting, 30, 67-74. DOI: https://doi.org/10.1016/j.adiac.2013.12.005
Boritz, E. (2003). Information Systems Assurance, in Research Accounting as an Information Systems Discipline, V. Arnold and S. G. Sutton, Eds., ed Sarasota, FL: American Accounting Association, 231-56.
Braun, R.L. and H.E. Davis, (2003). Computer-Assisted Audit Tools and Techniques: Analysis and Perspectives. Manager. Audit. J., 18(9): 725-731. DOI: https://doi.org/10.1108/02686900310500488
Curtis, M. B. & Payne, E. A. (2008). "An Examination of Contextual Factors and Individual Characteristics Affecting Technology Implementation Decisions in Auditing," International Journal of Accounting Information Systems, 9, 104-121, DOI: https://doi.org/10.1016/j.accinf.2007.10.002
Curtis, M.R. & A. Payne, E. (2014). Modeling Voluntary CAAT Utilization Decisions in Auditing. Managerial Auditing Journal, 29(4), 304-326. DOI: https://doi.org/10.1108/MAJ-07-2013-0903
Dale, S., Douglas H., and Jeffrey W. M. (2011). An Analysis of Attributes that Impact Information Technology Audit Quality: A study of IT and Financial Audit Practitioners. International Journal of Accounting Information Systems 13, 60–79. DOI: https://doi.org/10.1016/j.accinf.2011.11.001
Dandago, K. I. (1999). Auditing in Nigeria: A Comprehensive Text. 1st Edition, Kano: Adamu Joji Publishers.
Dandago, K.I. and Dije, M.S. (2005). “The Role of Internal Auditors in Establishing Honesty and Integrity: Are the Watch Dogs Asleep?” In: Dandago, K.I. and Hamid, K.T. (eds): Commitment and Due Process. Proceedings of the 3rd National Conference on Ethnical Issues in Accounting. Department of Accounting, Bayero University, Kano.
Davis, F. D., Bagozzi, R. P. & Warshaw, P. R. (1989). "User Acceptance of Computer Technology: A Comparison of Two Theoretical Models," Management Science, 8, 982-1003. DOI: https://doi.org/10.1287/mnsc.35.8.982
Debreceny, R., Lee, S. L., Neo, W. & ShulingToh, J. (2005). Employing Generalized Audit Software in the Financial Services Sector: Challenges and Opportunities. Managerial Auditing Journal, 20(6), 605-618.
Debreceny, R., Lee, S.L., Neo, W. and Toh, J. S. (2005). "Employing Generalized Audit Software in the Financial Services Sector: Challenges and Opportunities," Managerial Auditing Journal, vol. 20, 605. DOI: https://doi.org/10.1108/02686900510606092
Dias, C. & Marques, R. P. (2018). The use of computer-assisted audit tools and techniques by Portuguese internal auditors. 2018 13th Iberian Conference on Information Systems and Technologies (CISTI), 1–7. DOI: https://doi.org/10.23919/CISTI.2018.8399455
Dichapong, P., Paul C., and Richard F. (2013). IT Infusion within the Audit Process: Spreadsheet Use in Small Audit Firms. International Journal of Accounting Information Systems, Vol. 32, 213-276.
Dillman, D. A. (2007). Mail and Internet Surveys: The Tailored Design, Second Edition 2007 Update. John Wiley: Hoboken, NJ. 565.
Dobre, F. & Turlea, E. (2013). Financial Audit, a Three-Dimensional Approach. Genesis, Present and Future - Doctoral Thesis, ASE, Bucharest, 158.
Evans, C. L. (2018). Broad Band: The Untold Story of the Women Who Made the Internet. New York: Portfolio/Penguin. ISBN 9780735211759.
Files, R., Sharp, N.Y. & Thompson, A.M. (2014). Empirical Evidence of Repeat Restatements. Accounting Horizons 28: 93-123. DOI: https://doi.org/10.2308/acch-50615
Finnerty, C. C., Jeschke, M. G., Qian, W.J., Kaushal, A., Xiao, W., Liu, T. and Camp, D. G. (2013). Determination of Burn Patient Outcome by Large-Scale Quantitative Discovery Proteomics. Critical Care Medicine, 41(6), 1421. DOI: https://doi.org/10.1097/CCM.0b013e31827c072e
Gantz, J., & Reinsel, D. (2012). The digital universe in 2020: Big Data, Bigger Digital Shadows, and Biggest Growth in the Far East. IDC iView: IDC Analyze the Future, 2007(2012), 1-16.
Hall, J. A. (2016). Information Technology Auditing. Mason, OH: Cengage Learning.
Hu, P., Chan, P.Y.K., Liu, Sheng, O.R. & Tam, K.Y. (1999). Examining the Technology Acceptance Model Using Physician Acceptance of Telemedicine Technology, Journal of Management Information System, 1999; 16(2):91–112. DOI: https://doi.org/10.1080/07421222.1999.11518247
Hudson, M.E. (1998). CAATTs and Compliance. Internal Auditor, 55(2): 25-27.
Ignizio, J. P. (1990). An Introduction to Expert Systems: The Development and Implementation of Rule Based Expert Systems Hardcover.
IIA (UK), (2003). Internal Audit Automation Survey, the Institute of Internal Auditor UK and Ireland, London.
International Federation of Accountants (IFAC). (2015a). 2015 Handbook of International Quality Control, Auditing, Review, Other Assurance, and Related Services Pronouncements: Quality Control for the Audit of Financial Statements, ISA 220.
International Federation of Accountants (IFAC). (2015b). 2015 Handbook of International Quality Control, Auditing, Review, Other Assurance, and Related Services Pronouncements: ISA 500 Audit evidence.
International Federation of Accountants (IFAC). 2001. 2001 Handbook of International Quality Control, Auditing, Review, Other Assurance, and Related Services Pronouncements: ISA 620 Using the Work of an Auditors’ Expert.
Jalingo, U.A. & Mamudu, A. (2018). Analysis of the Determinants of Residential Willingness and Ability to Pay for Electricity Tariff and the Adoption of Inclusive Tariff Design in Northwestern Nigeria. Dutse International Journal of Social and Economics Research Vol. 1(1), 138-154.
Javad, A., Mohammad S. and Mitra D. G. (2013). The Barriers of Using Computer-assisted Auditing Techniques in the Private-Sector Auditing Enterprises of Iran. Journal of Basic and Applied Scientific Research 3(4)683-686.
Jordanian Association of Certified Public Accountants (JACPA). (2015). [Online] Available: http://jacpa.org.jo/ar-jo/home.aspx (January 1, 2015).
Joseph D. D. (2005). Computer Architecture: Fundamentals and Principles of Computer Design. CRC Press. p. 340. ISBN 9780849327490.
Kamesam, V. (2001). Information systems auditing policy for banking and financial sector. Reserve Bank of India, Information Technology, Mumba.
Kesharwani, A., & Bisht, S. S. (2012). The impact of trust and perceived risk on internet banking adoption in India. International Journal of Bank Marketing, 30(4), 303-322. DOI: https://doi.org/10.1108/02652321211236923
Kevin, F., Shimon, S., Elijah, H. and Leah, K. P. (2017). How Important are High Response Rates for College Surveys? The Review of Higher Education, Winter, Vol. 40, No 2, pp. 245-265. DOI: https://doi.org/10.1353/rhe.2017.0003
Khorwatt, E. (2015). Assessment of Business Risk and Control Risk in the Libyan Context. Open Journal of Accounting, 4(01). DOI: https://doi.org/10.4236/ojacct.2015.41001
Kobt, A. & Roberts, C. (2011). The Impact of e-business on the Audit Process: An Investigation of the Factors Leading to Change. International Journal of Auditing, 15, 150-175. DOI: https://doi.org/10.1111/j.1099-1123.2011.00427.x
KPMG. (2015). Data & Analytics enabled Internal Audit. Retrieved from https://assets.kpmg.com/content/dam/kpmg/pdf/2016/04/DA-Enabled-Internal-Audit-Survey.pdf
Laudon, K. C., & Laudon, J. P. (2016). Management Information Systems: Managing the Digital Firm. Upper Saddle River, N.J: Prentice Hall.
Lin, C. & Wang, C. (2011). A Selection Model for Auditing Software. Industrial Management and Data Systems, 111, 776-790. DOI: https://doi.org/10.1108/02635571111137304
Madugu, Y.U. (2011). The Impact of Commercial Buses on the Economy of Kano Metropolis 1967-2003, Published by LAP LAMBERT International Academic Publishing, Germany. 26-27.
Mahzan, N. and Lymer, A. (2008). Adoption of Computer Assisted Auditing Tools and Techniques by Internal Auditors: Current Issues in the UK. Being a Paper Presented for BAA Annual Conference, Blackpool, April, 2008.
Mahzan, N., & Lymer, A. (2014). Examining the Adoption of Computer-Assisted Audit Tools and Techniques: Cases of Generalized Audit Software use by Internal Auditors. Managerial Auditing Journal, 29, 327-349. DOI: https://doi.org/10.1108/MAJ-05-2013-0877
Mainoma, M. A. (2007). Financial Control and Management: A paper presented at ANAN (MCPD).
Maiyaki, A.A. (2012). Influence of Service Quality, Corporate Image, Perceived Value, Switching Cost and Culture on Customer Behavioural Response in the Nigerian Banks. An unpublished PhD Thesis.
Mangiuc, D.M. (2011). IT Applications – Spreadsheets for Auditors (II), Financial Audit Magazine, 1, 24.
Mansour, E.M. (2016). Factors Affecting the Adoption of Computer Assisted Auditing Techniques in Audit Process: Findings from Jordan. Journal of Business and Economic Research, ISSN 2162-4860, Vol. 6, No. 1. DOI: https://doi.org/10.5296/ber.v6i1.8996
Marilena, Z. & Alice, T. (2018). The Contribution of Computer Assisted Auditing Techniques (CAAT) and of the Business Intelligence Instruments in Financial Audit. Academic Journal of Economic Studies, 4, 1, 183-191.
Marshall, C. & Rossman, G. B. (1995). Designing Qualitative Research. London: Sage Publications.
Mehra, P. (2011). ‘Communicating in a Crisis: The Case of Jet Airways’ Published in Excel Collection of Case studies.
Micheal, A., Peter, G. and Gail, R. (2017). Explaining the Information Systems Auditor Role in the Public Sector Financial Audit. International Journal of Accounting Information Systems 24, 15–31. DOI: https://doi.org/10.1016/j.accinf.2016.12.003
Mohammad, A. A., Kamil, S. B. & Idris, B. M. N. (2017). Factors Influencing Adoption of Computer Assisted Auditing Techniques (CAATs) By External Auditors in Jordan. International Journal of Engineering Sciences & Management Research, 2349-6193.
Monteanu, C. (2014). Arguments on Using Computer Assisted Audit Techniques and Business Intelligent to Improve the Work of the Financial Auditor. Journal of Accounting and Auditing Valahia
Muhammad, M., Buba, R., Danial, M., & Ahmed, A. (2019). China’s involvement in the trans-Saharan textile trade and industry in Nigeria: the case of Kano. Review of African Political Economy, 47(1), 244-356. DOI: https://doi.org/10.1080/03056244.2019.1680356
Neuron, B. (2003). SAS 94: Issues and Opportunities, InfoTech Update, 12(1).
Olasanmi, O.O. (2013). Computer Aided Audit Techniques and Fraud Detection. Research Journal of Finance and Accounting 4: 67-79.
Omonuk, J.B. & Oni, A.A. (2015). Computer Assisted Auditing Techniques and Audit Quality in Developing Countries: Evidence from Nigeria. J Internet Bank Commer 20:127. DOI: https://doi.org/10.4172/1204-5357.1000127
Paukowits, F. (2000). Bridging CAATTS and Risk, Internal Auditor, 57, 2, 27.
Payne, E. A. & Curtis, M. B. (2010). Can the Unified Theory of Acceptance and Use of Technology Help Us Understand the Adoption of Computer-Aided Audit Techniques by Auditors? Working paper: University of Louisville and University of North Texas.
Rindang, W. and Synthia, A.S. (2017). Exploring the Use of Computer Assisted Audit Techniques and its Impact to the Transparency and Accountability of Financial Statements.
Romney, M. B. & Steinbart, P. J. (2015). Accounting Information Systems. Upper Saddle River, NJ: Prentice-Hall.
Rosli, K., Yeow, P. H. & Siew, E. G. (2012). Computer-Assisted Auditing Tools Acceptance Using I-Toe: A New Paradigm. Computer, 7, 15-2012.
Rouse, M. (2018). Fundamentals of Computer. Search Windows Server. Techtarget.
Sachin, U., Mandeep, K. & Govind, K. G. (2012). Vulnerability Assessment and Penetration Testing. See Discussions, Stats, and Author profiles for This Publication at: https://www.researchgate.net/publication/303859587.
Salant, P. and Dillman, D.A. (1994). How to Conduct Your Own Survey. John Wiley Co.: New York, NY. 232 pp. (Alternate selection, New Bridge Book Club; The Executive Program).
Santos, J.R. (1999). Cronbach’s Alpha: A Tool for Assessing the Reliability of Scales. J Ext. 32(2).
Sayana, S. A. & Cisa, C. (2003). Using CAATs to Support IS Audit. Information System Control Journal, 1, 21-23.
Singleton, T. and Flesher, D. L. (2003). A 25 Year Retrospective on the Institute of Internal auditors SAC project. Manager Audit. J., 18(1): 39-53. DOI: https://doi.org/10.1108/02686900310454237
Smith, E. E. (2013). "Recognizing a Collective Inheritance through the History of Women in Computing". CLC Web: Comparative Literature & Culture: A WWWeb Journal. 15 (1): 1–9. DOI: https://doi.org/10.7771/1481-4374.1972
The World Bank. (2017). Audit data analytics: opportunities and tips. The World Bank. Retrieved from http://siteresources.worldbank.org/EXTCENFINREPREF/Resources/4152117-1427109489814/SMPs_spreads_digital.pdf.
Venkatesh, V. & Bala, H. (2012). Adoption and Impacts of Inter Organizational Business Process Standards: Role of Partnering Synergy. Information Systems Research, 1–27. DOI: https://doi.org/10.1287/isre.1110.0404
Venkatesh, V., Morris, M, G. and Davis, F. (2003). User Acceptance of Information Technology toward a Unified View. MIS Quart., 27(3): 425-475.
Venkatesh, V., Morris, M, G. and Davis, F. (2012). User Acceptance of Information Technology toward a Unified View. MIS Quart., 27(3): 113-168. DOI: https://doi.org/10.2307/30036540
Venkatesh, V., Thong, J.Y.L, & Xu, X. (2016). Unified Theory of Acceptance and Use of Technology: A Synthesis and the Road Ahead. Journal of the Association for Information Systems, Vol 17, 5, 328-376. DOI: https://doi.org/10.17705/1jais.00428
Vermaat, E. M. (2013). Introductory to Microsoft Office 2013.Cengage Learning.
Zuiderwijk, A., Janssen, M., & Dwivedi, Y.K. (2015). Acceptance and use predictors of open data technologies: Drawing upon the unified theory of acceptance and use of technology. Government Information Quarterly, 32(4), 429-440. DOI: https://doi.org/10.1016/j.giq.2015.09.005
Downloads
Published
Issue
Section
License
Copyright (c) 2023 FUDMA Journal of Accounting and Finance Research [FUJAFR]

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
The FUDMA Journal of Accounting and Finance Research (FUJAFR) operates a copyright policy that ensures a balance between author rights and wide dissemination of scholarly work.
1. Author Copyright Retention
Authors retain full copyright of their published work without restriction. Submission to FUJAFR does not transfer ownership of copyright to the journal.
2. License to Publish
By submitting a manuscript and upon acceptance, authors grant FUJAFR:
- The right to publish, reproduce, and distribute the article
- The right to identify itself as the original publisher of the work
This grant is non-exclusive, meaning authors are free to reuse their work in other contexts, provided proper acknowledgment of the original publication in FUJAFR is made.
3. Licensing of Published Content
All articles are published under the:
Creative Commons Attribution-NonCommercial License (CC BY-NC 4.0)
Under this license:
- Users may share and adapt the work for non-commercial purposes only
- Proper attribution to the author(s) and the journal is required
- Any commercial use requires explicit permission from the copyright holder
4. Author Reuse Rights
Authors are permitted to:
- Archive their published articles in institutional repositories or personal websites
- Share their work for educational and research purposes
- Reuse portions of their work in future publications (e.g., books or other articles), provided proper citation of the original publication is included
5. Third-Party Content
Authors are responsible for obtaining permission to use any third-party copyrighted material (e.g., images, tables, datasets) included in their manuscripts. Proper acknowledgment must be provided where required.
6. Attribution Requirement
All users of FUJAFR content must provide appropriate credit, including:
- Author name(s)
- Article title
- Journal name (FUJAFR)
- Year of publication












