The purpose of this study is to investigate the approach required to conduct an efficient and effective audit of EDI systems. An audit approach proposed by Wu and Hahn (1989) is employed to examine, at a conceptual level, IS managers’ and CIS auditors’ perceptions of the audit approach necessary to evaluate internal controls in EDI systems. Wu and Hahn’s approach is based on a broader control concept and uses a control‐complexity/control‐point orientation to evaluate organisations’ internal control systems in dynamic computerised environments. Findings based on data from a sample of IS managers and CIS auditors showed general agreement with the audit approach proposed by Wu and Hahn and moderate consensus between the IS managers and CIS auditors regarding this approach.
Article navigation
1 October 1999
Literature Review|
October 01 1999
Wu and Hahn’s control‐complexity/control‐point orientation for computer information system (CIS) audits: an empirical test in an electronic data interchange (EDI) environment Available to Purchase
Catherine Hardy;
Catherine Hardy
School of Financial Studies, Charles Sturt University, Wagga Wagga, New South Wales, Australia
Search for other works by this author on:
Robert Reeve
Robert Reeve
School of Economic and Financial Studies, Macquarie University, Sydney, New South Wales, Australia
Search for other works by this author on:
Publisher: Emerald Publishing
Online ISSN: 1758-7735
Print ISSN: 0268-6902
© MCB UP Limited
1999
Managerial Auditing Journal (1999) 14 (7): 339–350.
Citation
Hardy C, Reeve R (1999), "Wu and Hahn’s control‐complexity/control‐point orientation for computer information system (CIS) audits: an empirical test in an electronic data interchange (EDI) environment". Managerial Auditing Journal, Vol. 14 No. 7 pp. 339–350, doi: https://doi.org/10.1108/02686909910289821
Download citation file:
Suggested Reading
Mechanisms for controlling access in the global grid environment
Internet Research (December,2004)
The authentication and authorization infrastructure of perfSONAR MDM
Campus-Wide Information Systems (November,2008)
Admission control in computer networks with uncertain parameters
Kybernetes (August,2009)
Brain‐controlled robot agent: an EEG‐based eRobot agent
Industrial Robot (October,2008)
Detection of malicious traffic on back‐bone links via packet header analysis
Campus-Wide Information Systems (November,2008)
Related Chapters
Close to the edge: Cyberterrorism today
Understanding Terrorism
Employee Health for Strategic Adaptation: The Role of Enabling and Constraining Performance Measurement
Responding to Uncertain Conditions: New Research on Strategic Adaptation
Recommended for you
These recommendations are informed by your reading behaviors and indicated interests.
