IJSTR

International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
0.2
2019CiteScore
 
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020

CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT

IJSTR >> Volume 1 - Issue 7, August 2012 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Empirical Analysis of The Impact of Information Technology On Forensic Accounting Practice In Cross River State- Nigeria

[Full Text]

 

AUTHOR(S)

Akabom-Ita Asuquo, PhD

 

KEYWORDS

Keywords: Forensic accounting, information technology, computerized evidence, computerized investigation, forensic accountants.

 

ABSTRACT

Abstract- The increasing rate of computer based financial crime has created a huge demand for the skills and services provided by forensic Accountants in the country. Forensic Accountants are specialized individuals who use information technology to gather and analyze evidence pertaining to the case they investigate. The main objective of this study was to investigate empirically, the impact of emerging information technology on forensic accounting activities in Cross River State. A survey, using self-administered interview was conducted to achieve this objective. Forty (40) interviews were conducted with various accounting professionals who are directly or indirectly linked to the business of investigative accounting. Data collected were analyzed using ANOVA statistic. The results of the study revealed that accounting professionals need to enhance their knowledge and skills of computerized accounting systems for the purpose of planning, directing, supervising and reviewing the work performed. Therefore, accounting professionals should better understand and evaluate their computerized accounting systems to enable them carry out more effectively, the business of investigative accounting now and in the future.

 

REFERENCES

1) Bigler, M. (2001). Computer Forensics Gear. The Internal Auditor, August, p27.

2) Carmichael, D R & Graham, L. (2009). Accountant’s Handbook 2009, New York: John Wiley and Sons

3) Coenen, T. L. (2005). “Forensic Accounting,” A new twist on bean counting,” Tracy@sequence-inc.com

4) Crumbley, D. L. (2006). “Forensic Accountants Appearing in the literature,” www.forensicaccounting.com.

5) Dedrick, J. Gurbaxani, V. and Kraemer, K. L. (2003). “Information technology and Economic Performance: A Critical Review of the Empirical Evidence” Centre for Research on Information Technology and Organizations. University of California, Irvine.

6) Dixon, P. D. (2005). An overview of computer forensics. IEEE Potentials, 24(5), 710.

7) Elliott, R. K. (1998). Who are we as a profession and what must we become? Journals of Accountancy (February): 81.(85).

8) Gavish, A. (2007). The Hidden Costs of Computer Misconduct. Security.

9) Golden, T. W; Skalak, S. L. and Clayton, M. M. (2006). A guide to forensic accounting investigation, New York: John Wiley and Sons.

10) Granlund, M., and Mouristen, J., (2003). “Problematizing the relationship between management control and IT”, European Accounting Review, (12) (1), pp. 77-83.

11) Hinders, D. (2009). What is forensic Accounting?” retrieved on 4 June 2009, from http://www.wisegeek.com.

12) Howard S. and Sheetz, M. (2006). Forensic Accounting and Fraud Investigation for non-Experts, New Jersey, John Wiley and Sons Inc.

13) Huang, C. J. and Liu, C.J. (2005). “Exploration for the relationship between Innovation, IT and performance,” Journal of Intellectual Capital, vol. 6, no. 2:237-252.http://dx.doi.org/10.1108/14691930510592825

14) Iwata, E. (2003). ‘Accounting Detectives in Demand,’ USA Today, 27 February.

15) Joshi, M. S. (2003). “Definition of Forensic Accounting” www.forensicaccounting.com.

16) KPMG (2008). “Fraud survey.” Journal of Forensic Accounting, No 4 Vol. 36,pp 9-20.

17) Leech, S.A., and Dowling, C. (2006). An investigation of decision aids in audit firms: Current practice and opportunities for future research. Working paper, University of Melbourne.

18) Manning, G.A. (2005). Financial investigation and forensic accounting, CRC Press.

19) Manson, S.; McCartney, S. and Sherer, M. (1997). Audit Automation: The Use of Information Technology in the planning, Controlling and Recording of Audit Work. Edinburgh: Institute of Chartered Accountants of Scotland.

20) Mohay, G. M., Anderson, A., Collie, B., de Vel, O & McKemmish, R. (2003). Computer and intrusion forensics, London, UK Artech House.

21) Murphy, R. (2009). The DNA of a forensic accountant,’ PricewaterhouseCoopers, retrieved on 4 June 2009, from http://www.pwc.com.

22) Nunn, L,; McGuire, B. L.; Whitcomb, C. and Jost, E. (2006). ‘Forensic Accountants: Financial Investigations,’ Journal of Business & Economic Research, vol. 4, no. 2, pp. 1-6.

23) Piazza, P. (2003). ‘Now You See It, ‘ Security Management, December 2003, p 26.

24) Ramaswany, V. (2005), ‘ Corporate Government and the Forensic Accountant,’ CPA Journal, No. 10, vol; 75, pp. 63 – 68.

25) Satov, T. (2003). ‘ Back from the Shred, ‘ CA Magazine, November, p 10.

26) Sing, A. (1992). ‘Forensic Accounting: Looking for clues,’ Australian CPA, march, p. 42.

27) Singleton, R., Singleton, A., Bologna, J. & Lindquist, R. J. (2006). Fraud auditing and forensic accounting, New York: John Wiley and Sons.

28) Smith, G. S. (2005). Computer Forensics: Helping to Achieve the Auditor’s Fraud Mission. Journal of Forensic Accounting, vol, 119-134.

29) Vacca, J. R. (2005). Comptuer forensic: computer crime scene investigation, Cengage Learning.

30) Vera-Munoz, S.C., Hov, J. L. and Chow C.W. (2006). Enhancing knowledge sharing in public accounting firms. Accounting horizons 20 (2):133-155.

31) Wang, C.H.; Gopal, R.D. and Zionts, S. (1997). Use of data environment analysis in assessing information technology impact on firm performance. Annals of Operations Research 73:191-213.

32) Winters, B.I. (2004). Choosing the right tools for internal control reporting. Journal of Accountancy (February): 32-41.