Access the full text.
Sign up today, get DeepDyve free for 14 days.
P. De, Arun Sen (1988)
Semantic Modeling of Internal Controls in Database DesignJ. Manag. Inf. Syst., 5
W. Orlikowski, D. Robey (1991)
Information Technology and the Structuring of OrganizationsInf. Syst. Res., 2
Gerald Trites (2004)
Director responsibility for IT governanceInt. J. Account. Inf. Syst., 5
A. Korvin, M. Shipley, K. Omer (2004)
Assessing risks due to threats to internal control in a computer-based accounting information system: a pragmatic approach based on fuzzy set theoryIntell. Syst. Account. Finance Manag., 12
Catherine Hardy, R. Reeve (2000)
A study of the internal control structure for electronic data interchange systems using the analytic hierarchy processAccounting and Finance, 40
A. Wright, S. Wright (1996)
The Relationship Between Assessments of Internal Control Strength and Error Occurrence, Impact and CauseAccounting and Business Research, 27
D. Hermanson, M. Hill, D. Ivancevich (2000)
Information Technology-Related Activities of Internal AuditorsJ. Inf. Syst., 14
A. Serenko, M. Cocosila, Ofir Turel (2008)
The state and evolution of information systems research in canada: a scientometric analysisCanadian Journal of Administrative Sciences-revue Canadienne Des Sciences De L Administration, 25
Constance Lehmann, Cynthia Heagy, C. Norman (2007)
The Evaluation of Application Controls in Accounting Software: A Short Instructional CaseJ. Inf. Syst., 21
M. Markus (2004)
Technochange management: using IT to drive organizational changeJournal of Information Technology, 19
Se-Joon Hong, K. Tam (2006)
Understanding the Adoption of Multipurpose Information Appliances: The Case of Mobile Data ServicesInf. Syst. Res., 17
R. Krishnan, James Peters, R. Padman, D. Kaplan (2005)
On Data Reliability Assessment in Accounting Information SystemsInf. Syst. Res., 16
L. Cunningham (2003)
The Appeal and Limits of Internal Controls to Fight Fraud, Terrorism, Other IllsAdministrative Law
D. Baird, R. Rasmussen (2002)
Four (or Five) Easy Lessons From EnronVanderbilt Law Review, 55
P. Evangelista, E. Sweeney (2009)
The Role of Information and Communication Technology in Small Italian Logistics EnterprisesInternational Journal of Business and Systems Research, 3
Parveen Gupta, Nandkumar Nayar (2007)
Information content of control deficiency disclosures under the Sarbanes–Oxley Act: An empirical investigationInternational Journal of Disclosure and Governance, 4
G. Hughes (1990)
Managing high-tech product cyclesThe Executive, 4
Terri Griffith (1999)
Technology Features as Triggers for SensemakingAcademy of Management Review, 24
R. Cooper (2000)
Information Technology Development Creativity: A Case Study of Attempted Radical ChangeMIS Q., 24
Mahmoud Watad, Cesar Perez-Alvarez (2006)
Managers' Perceptions of the Role of It in Organizational ChangeJournal of Management Information and Decision Sciences, 9
E. Davidson (2006)
A Technological Frames Perspective on Information Technology and Organizational ChangeThe Journal of Applied Behavioral Science, 42
Chris Hogan, Michael Wilkins (2008)
Evidence on the Audit Risk Model: Do Auditors Increase Audit Fees in the Presence of Internal Control Deficiencies?Contemporary Accounting Research, 25
H. Teo, B. Tan (1997)
Organizational Transformation Using Electronic Data Interchange: The Case of TradeNet in SingaporeJ. Manag. Inf. Syst., 13
D. Snow, E. Rochford, S. Worden, Robert Benford (1986)
Frame alignment processes, micromobilization, and movement participation.American Sociological Review, 51
Sangjae Lee, Hyunchul Ahn (2010)
The Organizational Contexts, Controls and Implementation of E-BusinessJournal of Computer Information Systems, 51
R. Yin (1981)
The Case Study Crisis: Some AnswersAdministrative Science Quarterly, 26
E. Davidson (2002)
Technology Frames and Framing: A Socio-Cognitive Investigation of Requirements DeterminationMIS Q., 26
W. Orlikowski (2000)
Using Technology and Constituting Structures: A Practice Lens for Studying Technology in Organizations
Robert Burgelman (1991)
Intraorganizational Ecology of Strategy Making and Organizational Adaptation: Theory and Field ResearchOrganization Science, 2
J. Doyle, Weili Ge, Sarah McVay (2006)
Determinants of Weaknesses in Internal Control over Financial ReportingRoss: Accounting (Topic)
H. Ashbaugh-Skaife, D. Collins, William Kinney (2007)
The Discovery and Reporting of Internal Control Deficiencies Prior to SOX-Mandated AuditsJournal of Accounting and Economics, 44
K. Eisenhardt (1989)
Building theories from case study researchSTUDI ORGANIZZATIVI
W. Orlikowski, S. Barley (2001)
Technology and Institutions: What Can Research on Information Technology and Research on Organizations Learn from Each Other?MIS Q., 25
June Wei, Lai Liu, Kai Koong, Y. Li (2011)
A risk assessment model for information securityInternational Journal of Business and Systems Research, 5
Richard Burton (2000)
Discussion of Information Technology-Related Activities of Internal AuditorsJ. Inf. Syst., 14
B. Burnes (2005)
Complexity Theories and Organizational ChangeInternational Journal of Management Reviews, 7
Evelyn Patterson, J. Smith (2007)
The Effects of Sarbanes‐Oxley on Auditing and Internal Control StrengthThe Accounting Review, 82
Jagdish Pathak (2004)
IT Auditing and Electronic Funds Transfers
Gavin Schwarz (2002)
Organizational hierarchy adaptation and information technologyInf. Organ., 12
E. Mutsaers, H. Zee, Henrik Giertz (1998)
The evolution of information technologyInf. Manag. Comput. Secur., 6
The adoption of information technology/information systems (IT/IS) makes it possible to automate the tasks of approving, recording, processing and reporting of transactions. To ensure operational performance, financial information reliability and legal compliance, internal control mechanisms should be gradually constructed into the IT systems, according to the computerisation of the organisation, in order to continue to exercise the controls. However, the adoption of new IT systems often results in internal control deficiencies (ICD) and operational risks due to differences in the perceptual frames of different groups, and hence, a failure in internal controls adaptation. Therefore, this study referred to technological frames of reference (TFR) in order to propose an internal control adaptation model (ICAM) for IT systems adoption. This study explored a case of new IT system adoption in a company and gathered the longitudinal data in order to explain the process of internal control adaptation and the improvements of ICDs, as well as validate the propositions developed by this study. The results can serve as a reference in the construction of internal control mechanisms for new IT systems adoption and as a theoretic foundation of further studies.
International Journal of Business and Systems Research – Inderscience Publishers
Published: Jan 1, 2014
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.