Hardy - Study of Internal Control Structure For EDI
Hardy - Study of Internal Control Structure For EDI
3d
Abstract
1. Introduction
The authors are grateful to the Coopers & Lybrand Visiting Professor Scheme
which enabled Professor Ron Weber, of The University of Queensland, to visit
Charles Sturt University and discuss ideas and issues in the early stages of this
study. They also acknowledge the constructive comments from delegates at the
1998 AAANZ Annual Conference, and from participants at a Macquarie
University research seminar, on earlier drafts. The authors have received
valuable advice from the editors and referees.
1
This is now the Australian Auditing and Assurance Standards Board
# AAANZ, 2000
{Journals}acfi/40_3/z126/makeup/z126.3d
increase risk...'. (AUS 214 para 17). This study is a unique effort to focus on IS
managers' and CIS auditors' judgements of the relative importance of control
categories and control elements in the internal control structure of EDI
systems. An examination of these judgements will assist in determining which
of the control categories and elements presented in the professional statements
and other prescriptive sources are judged by CIS professionals to be important
constituents of a reliable internal control structure. The findings from this
study should provide a preliminary basis for authoritative bodies such as the
Australian Auditing Standards Board, Tradegate ECA, and auditing educators
to discuss the extent and nature of authoritative guidance necessary to support
managers and auditors in implementing, maintaining and evaluating internal
control structures in EDI systems.
Second, to fulfil their legal and professional responsibilities, both IS
managers and CIS auditors need to ensure that EDI systems are properly
controlled (Ryrie, 1994). Risks of theft, destruction, interception, alteration,
stalling or re-routing of data, as well as forged messages must be minimised
(Greenstein and Feinman, 2000). The reliability of the internal control
structure can be assessed by identifying the strengths and weaknesses in the
structure, weighting the importance of these strengths and weaknesses,
imposing some organisation upon them in order to facilitate decision making,
and performing an overall evaluation (Weber, 1980; Gill and Cosserat, 1993;
Gul et al., 1994). Evaluating internal control in EDI systems is further
complicated by shared interfaces between trading partners. Perceptions of
internal control importance may differ between organisations resulting in EDI
systems considered to be not mutually reliable. Therefore, IS managers and
CIS auditors need to work together, both within their own organisations, and
with their peers from trading partner organisations, to establish EDI systems
with reliable internal control structures.
Furthermore, because IS managers and CIS auditors need to work
together, the level of consensus (agreement) or disagreement between their
judgement of the importance of control areas can help identify control areas
requiring further analysis. For example, finding consensus in internal control
judgements will identify control areas where it is likely that generally accepted
practice exists. On the other hand, differences would indicate areas where
such generally accepted practice may not exist, and could indicate a
potentially weak control area. In these areas IS managers and CIS auditors
could have different perspectives or use different types of knowledge and
information in making judgements, which could be due to their different
educational and professional backgrounds, or association with different
industry and professional bodies. For example, IS management may not
consider a control area important enough to ensure adequate internal
control. CIS auditors should ensure adequate control exists in those control
areas where a significant lack of consensus has been identified. This paper
attempts to shed light on these issues.
# AAANZ, 2000
{Journals}acfi/40_3/z126/makeup/z126.3d
Given the exploratory nature of this research we have not developed formal
hypotheses, but have used the following research objectives to guide our
empirical work:
Only the financial statement audit is investigated in this study. However, the
results should be informative for other types of audits as they are interrelated
to some degree (Landry et al., 1989).
# AAANZ, 2000
{Journals}acfi/40_3/z126/makeup/z126.3d
The AHP is used in this study to model the internal control judgements of IS
managers and CIS auditors, and to provide measures of the consistency of
those judgements. The AHP judgement model is based on a multiple criteria
method of choice (Saaty, 1987; Apostolou and Hassell, 1993a). It represents
problems in a hierarchical structure, in order to develop priorities for
alternatives based on a decision maker's judgement (Saaty, 1980, 1987, 1988,
1990a, 1990b). While the AHP is conceptually simple to use, it is still powerful
enough to handle complex issues (Saaty, 1990b). The areas in which the AHP
has been applied are diverse and numerous (Zahedi, 1986; Shim, 1989; Vargas,
1990; Apostolou and Hassell, 1993a; Palmer, 1999). The AHP was introduced
into the accounting literature in the early 1980s and has primarily been used by
accounting researchers to model decision processes of individuals, and as an
aid in making choices (Arrington et al., 1984; Harper, 1988; Messier and
Schneider, 1988; Apostolou and Hassell, 1993a; Yau and Davis, 1993; Emby
and Etherington, 1996; Schniederjans and Garvin, 1997).
There are two major phases to the AHP, namely, designing the hierarchy
and evaluating the hierarchy (Vargas, 1990). The hierarchy employed in this
study is based on the framework set out in Tradegate ECA's EDI Control
Guide (1990) and Practical Internal Control Guide for EDI Implementations
(1995). Tradegate ECA is the prime user association for electronic commerce in
Australia. The EDI internal control hierarchy developed for this study is
summarised in Figure 1. This hierarchy is consistent with the five major areas
of concern organisations face when implementing and using EDI identified by
Chan (1992), and salient aspects of internal control for EDI found in the
literature (Hansen and Hill, 1989; Chan et al., 1993; Walden and Braganza,
1993; Jamieson, 1994).
Level 1 of the hierarchy is the overall objective of the judgement, that is
internal control structure reliability. Level 2 identifies the major control
categories set out in the control guide literature from Tradegate ECA, namely,
organisational, application, authentication, security, and third party (network
and mailbox storage security) controls. Level 3 consists of 24 control elements
# AAANZ, 2000
{Journals}acfi/40_3/z126/makeup/z126.3d
# AAANZ, 2000
196
C. Hardy, R. Reeve / Accounting and Finance 40 (2000) 191± 210
Level 1 Internal control structure reliability
Level 2 Organisational Application Controls Authentication Controls Security Controls Third Party Controls
Controls
Level 3 Managerial tone= In=Outbound transaction Authentication of trading Logical security controls Logical &
Control controls partner & transaction operational security
content
Audit committees Document standards Authorisation of Physical security controls Third party
transaction initiation agreements
Internal audit File retention Contingency controls Operational security Audit trails
External influences Application development= Reporting, logging & audit Audit of third party
Program change controls trails provider
which are based on the Tradegate ECA literature, Auditing Standards (AUS
214 and AUS 402), audit manuals and prior studies.
The data were collected by means of a mail survey. Despite the problems
associated with self-administered questionnaires, especially lower internal
validity, the survey method was chosen because of its effectiveness on the basis
of accessibility, timeliness, cost, and potentially higher external validity. The
survey questionnaire was administered by mail because of the advantages of
ensuring a representative sample at lower costs, which outweighed the
disadvantages of low response rates and having to use closed-ended questions
(de Vaus, 1991).
The target population comprised IS managers and CIS internal auditors
from organisations which were members of Tradegate ECA, and CIS external
auditors from Big 6 accounting firms. Selection of the sample was restricted to
the states of New South Wales and Victoria because 75 per cent of Australian
EDI users had their headquarters located in those states (Coopers and
Lybrand, 1994). The IS managers were then randomly selected from a list of
EDI users obtained from Tradegate ECA, and the CIS internal auditors and
external auditors from the directory of members of the Institute of Chartered
Accountants in Australia.
The survey yielded 54 responses from 159 questionnaires mailed, of which 48
were useable: 23 from IS managers, and 25 from CIS internal and external
auditors. The auditor responses were combined for further statistical analyses.
Statistical tests showed that there were no significant differences in the
judgements of the CIS internal auditors and CIS external auditors for the five
major control categories.
Given the relatively low response rate, questionnaire non-response bias was
considered. The surrogate method for testing non-response bias, which treats
late responders as equivalent to non-responders, was used (Wallace and
Mellor, 1988). Statistical tests showed that there were no significant differences
in the judgements of the early and late responders for the five major control
categories, reducing the likelihood of non-response bias.
# AAANZ, 2000
{Journals}acfi/40_3/z126/makeup/z126.3d
# AAANZ, 2000
{Journals}acfi/40_3/z126/makeup/z126.3d
Table 1
Panel 1
Significance of differences in internal control category mean weights between respondents with
different consistency ratios for the hierarchy (CRH)
(1) Results from MANOVA excluding the variable with the lowest mean weight (Third party).
F(4,43) 2.23 (p 0.08). Exclusion of a variable is necessary to overcome the linear dependence
which is an artefact of AHP weights.
(2) Results from one-way ANOVA. F(1,46).
Panel 2
Significance of differences in consistency ratios (CR and CRH) between IS managers and CIS
auditors
Panel 3
Significance of differences in consistency ratios for control categories between IS managers and CIS
auditors
# AAANZ, 2000
{Journals}acfi/40_3/z126/makeup/z126.3d
consistent respondents (CRH Å 0.10) were not significantly different from those
of less consistent respondents (CRH > 0.10).
The one-way ANOVA results in Panel 2 show no significant difference
between the IS manager and CIS auditor groups for either the consistency ratio
(CR) (Wilks' criterion p 0.36), or for the consistency ratio for the hierarchy
(CRH) (Wilks' criterion p 0.63). Finally, a MANOVA was performed to test
for differences, between the IS manager and CIS auditor groups, for the
combined control category consistency ratios (CR). The results in Panel 3 show
that the combined dependent variables were not significantly different (Wilks'
criterion p 0.22).
The results summarised in Table 1 show that although, on average, neither
IS managers nor CIS auditors had highly consistent responses (CRH Å 0.10),
neither group was more consistent in their judgements. Therefore, as the
internal control mean weights did not differ significantly between highly
consistent respondents (CRH Å 0.10), and less consistent respondents
(CRH > 0.10), the validity of the responses was considered acceptable.
# AAANZ, 2000
{Journals}acfi/40_3/z126/makeup/z126.3d
Table 2
AHP judgement models: summary of results
Control categories
Organisational controls 0.16 39.6 20.8 39.6
Application controls 0.29 83.3 12.5 4.2
Authentication controls 0.22 54.2 35.4 10.4
Security controls 0.21 62.5 29.2 8.3
Third party controls 0.12 20.8 29.2 50.0
# AAANZ, 2000
{Journals}acfi/40_3/z126/makeup/z126.3d
# AAANZ, 2000
{Journals}acfi/40_3/z126/makeup/z126.3d
Table 3 summarises results from the MANOVA and ANOVA tests used to
compare the mean synthesised internal control weights of the IS manager and
CIS auditor groups. Recall that when testing AHP weights with MANOVA,
one variable has to be excluded to overcome the linear dependence of AHP
weights. In these MANOVAs the variable with the lowest mean weight was
excluded and subsequently tested using one-way ANOVAs.
Inspection of the control categories section of Table 3 shows that the mean
weights of the combined control category variables (with the third party
category excluded) were not significantly different between IS managers and
CIS auditors (Wilks' criterion p 0.18). The excluded third party control
category did show a significant difference in the mean weights of IS managers
and CIS auditors ( p 0.03). Here internal control judgements may be
influenced by circumstances relating to specific third party arrangements.
However, inspection of the third party control elements section of Table 3
shows that the mean weights of the combined control element variables (with
the third party agreements element excluded) were not significantly different
between IS managers and CIS auditors (Wilks' criterion p 0.29). Further-
more, the excluded third party agreements element did not show a significant
difference in the mean weights of IS managers and CIS auditors ( p 0.60).
An examination of the remaining control element categories in Table 3
shows no significant differences between the mean weights for each of the two
expert groups except for the file retention element ( p 0.02) within the
application control element category and the security control elements
category (Wilks' criterion p 0.02). The lower weightings and differences in
judgements between the two expert groups for file retention controls may be
partly explained by the area being highly dependent on specific organisational
and regulatory policies.
As the mean weights of the combined security control element variables
(with the operational security element excluded) were significantly different
between IS managers and CIS auditors, one-way ANOVAs were carried out on
all control elements. None showed a significant difference between IS
managers and CIS auditors except for the encryption techniques element
( p 0.02) and the operational security control element ( p < 0.01). Operational
security and encryption techniques were weighted among the least important in
each expert group, with backup and recovery procedures ranked the highest.
These findings appear to be consistent with observations made in the literature.
Providing a technological environment in which secure messages can be sent
between trading partners is a crucial aspect of EDI systems. Methods such as
encryption techniques provide some means of achieving the goal of a safe,
business-oriented messaging environment. However, because the potential
payoffs to hackers that can circumvent controls are high, existing methods
need to be continuously tested, improved and new security methods explored
# AAANZ, 2000
{Journals}acfi/40_3/z126/makeup/z126.3d
Table 3
Significance of differences in mean internal control weights between IS managers and CIS auditors
Control categories
Organisational controls 0.16 0.16
Application controls 0.26 0.32
Authentication controls 0.23 0.21
Security controls 0.21 0.21
Third party controls 0.14 0.09 0.03 (2)
(a) Results from MANOVAs, excluding the variable with the lowest mean weight. Exclusion of a
variable is necessary to overcome the linear dependence which is an artefact of AHP weights.
(2) Results from one-way ANOVAs.
{Journals}acfi/40_3/z126/makeup/z126.3d
(Greenstein and Feinman, 2000). Further, even the best designed system
cannot control unforeseen man-made (e.g., viruses, hardware failure) or
natural disasters (e.g., fires, floods). Backup and recovery procedures are seen
as being essential to minimise such interruptions to organisational operations.
5. Discussion
5.1. Limitations
While this study of the internal control structure in EDI systems has several
limitations, none are considered to be of such significance as to negate the
contribution to understanding made by the results. The survey method
employed in this study imposed several limitations. First, the design of the
questionnaire represented a tradeoff between realism and subject fatigue
(Landry et al., 1989). To assist in minimising this limitation, procedures were
employed and detailed instructions were provided in the questionnaire to place
the research task as close as possible to actual real world task concerns.
This study did not address specific EDI system installations. Therefore
agreement `in fact' as analysed by Ashton (1974) and others was not possible
(Harper, 1988). As the study was based on a very general situation,
respondents had to determine their own reference in which to evaluate the
internal control elements (Messier and Schneider, 1988; Harper et al., 1992).
However, a tradeoff with this limitation is that the results are generalisable.
It may be argued that the results `are an artefact of a prespecified hierarchy'
(Messier and Schneider, 1988). The selection of the controls included in the
study and the subsequent categorisation may have resulted in controls being
inadvertently omitted. However, the hierarchy was developed based on a
thorough literature review and underwent a review process prior to the
instrument being disseminated so as to overcome this possibility. Therefore,
while it may argued that the hierarchical abstraction may be perceived by
individuals differently it still enables one to `communicate a sense of judgement
which involves common understanding (but not without differences)' (Saaty,
1980).
Another limitation in using the AHP is that the direct assessment of
importance of each of the 24 control elements vis-a-vis each other was not
obtained. Therefore, the weights in the full judgement models are dependent on
the validity of the AHP synthesis (aggregation) process. However, without the
use of the AHP, each respondent would have had to make a total of 295
pairwise comparisons, compared to a total of 59 pairwise comparisons in this
study, with consequent effects on the response rate.
IS managers and CIS auditors have a similar mandate when viewed from the
shareholders' perspective. Therefore, it is expected that their judgements on
internal control will be similar. However, care has been taken in this study to
# AAANZ, 2000
{Journals}acfi/40_3/z126/makeup/z126.3d
separately capture the judgements of these two expert groups responsible for
information integrity and control assurance in EDI systems (Chan et al., 1993).
# AAANZ, 2000
{Journals}acfi/40_3/z126/makeup/z126.3d
including AHP results with consistency ratios of greater than 0.10 in the
analysis, may not distort the results. Apostolou and Hassell (1993b) found
similar results when the sample size was relatively large, but Harper's (1988)
study, which used a small sample size, did not. Therefore, to determine whether
the results are generalisable, future research could investigate other contextual
variables, such as the type of task and the number of factors assessed, to
determine when departure from the 0.10 consistency ratio threshold is
appropriate (Apostolou and Hassell, 1993b).
EDI has evolved substantially over the past three decades in both extent of
use and technological sophistication. As efficient supply chain management
becomes an increasingly important goal, organisations are discovering that
fully integrated EDI systems are a necessary enabling mechanism (Greenstein
and Feinman, 2000). Further, the widespread infrastructure of the Internet is
also greatly increasing connectivity and interoperability. However, the success
of EDI and Internet EDI systems ultimately depends not on technology but on
the trust business partners and customers place in these systems. Achieving this
trust requires IS managers and CIS auditors to work together to ensure the
reliability of the internal control structures in EDI systems. This study has
found a substantial body of consensus or `generally accepted practice' between
these two expert groups with regard to the relative importance of the elements
of the internal control structure in EDI systems. Therefore, while the
achievement of reliable internal control structures in EDI systems will not be
easy, it should not be unduly complicated by differences in judgement between
IS managers and CIS auditors.
References
Adolphson, D.L. and J.V. Hansen, 1991, Evaluating software controls for electronic
data interchange, European Journal of Operational Research 51, 42 ± 46.
Aggarwal, R. and Z. Rezaee, 1996, EDI risk assessment, The Internal Auditor 53, 40 ± 44.
Apostolou, B. and J.M. Hassell, 1993a, An overview of the analytic hierarchy process
and its use in accounting research, Journal of Accounting Literature 12, 1 ± 28.
Apostolou, B. and J.M. Hassell, 1993b, An empirical examination of the sensitivity of
the analytic hierarchy process to departures from recommended consistency ratios,
Mathematical and Computer Modelling 17, 163± 170.
Arrington, C.E., W. Hillison, and R.E. Jensen, 1984, An application of analytical
hierarchy process to model expert judgement on analytical review procedures, Journal
of Accounting Research 22, 298± 312.
Ashton, R.H., 1974, An experimental study of internal control judgments, Journal of
Accounting Research 12, 143±157.
Ashton, A.H., 1985, Does consensus imply accuracy in accounting studies of decision
making?, The Accounting Review 60, 173± 185.
Australian Auditing Standard (AUS) 214 Auditing in a CIS environment, in Australian
Society of CPAs and The Institute of Chartered Accountants in Australia, 1997,
Auditing Handbook (Australian Auditing Standards Board, Australian Accounting
Research Foundation, Prentice Hall).
Australian Auditing Standard (AUS) 402 Risk assessment and internal controls, in:
# AAANZ, 2000
{Journals}acfi/40_3/z126/makeup/z126.3d
# AAANZ, 2000
{Journals}acfi/40_3/z126/makeup/z126.3d
Saaty, T.L., 1980, The analytic hierarchy process (McGraw-Hill, New York).
Saaty, T.L., 1986a, Decision making for leaders (RWS Publications, Pittsburgh).
Saaty, T.L., 1986b, Absolute and relative measurement with the AHP: The most livable
cities in the United States, Socio-Economic Planning Science 20, 327±331.
Saaty, T.L., 1987, Concepts, theory and techniques, rank generation, preservation and
reversal in the analytic hierarchy decision process, Decision Sciences 18, 157± 177.
Saaty, T.L., 1988, The analytic hierarchy process (RWS Publications, Pittsburgh).
Saaty, T.L., 1990a, How to make a decision: The analytic hierarchy process, European
Journal of Operational Research 48, 9 ±26.
Saaty, T.L., 1990b, Multicriteria decision making: The analytic hierarchy process (RWS
Publications, Pittsburgh).
Schniederjans, M.J. and T. Garvin, 1997, Using the analytic hierarchy process and
multi-objective programming for the selection of cost drivers in activity-based
costing, European Journal of Operational Research 100, 72 ± 80.
Shim, J.P., 1989, Bibliographical research on the analytic hierarchy process, Socio-
Economic Planning Sciences 23, 161± 167.
Tradegate ECA (formerly EDI Council of Australia and then ECA Australia) and
Information Systems Audit and Control Association (formerly EDP Auditors
Association), 1990, EDI control guide (Tradegate ECA, Australia).
Tradegate ECA (formerly EDI Council of Australia and then ECA Australia)
Accounting and Finance Working Party, 1995, Practical internal control guide for
EDI implementations (Tradegate ECA, Australia).
Tradegate ECA (formerly EDI Council of Australia and then ECA Australia), 1996,
Electronic Commerce Newsletter. August 5, 1 ± 8.
Trotman, K. and R. Wood, 1991, A meta-analysis of studies on internal control
judgments of internal control systems, Journal of Accounting Research 29, 180± 192.
Trotman, K., 1998, Audit judgement research: Issues addressed, research methods and
future directions, Accounting and Finance 38, 115± 156.
Vargas, L.G., 1990, An overview of the analytic hierarchy process and its applications,
European Journal of Operational Research 48, 2 ± 8.
Walden, I. and A. Braganza, 1993, EDI: audit and control (NCC Blackwell,
Manchester).
Wallace, R.S.O. and C.J. Mellor, 1988, Nonresponse bias in mail accounting surveys: a
pedagogical note, British Accounting Review 20, 131± 139.
Weber, R., 1980, Some characteristics of the free recall of computer controls by EDP
auditors, Journal of Accounting Research 18, 214± 241.
Weber, R., 1988, EDP auditing, conceptual foundations and practice 2nd ed., (McGraw-
Hill, New York).
Weiner, S., 1995, Business risk, internal control and audit implications of EDI, The
CPA Journal 65, 56 ± 61.
Yau, C. and T. Davis, 1993, Using the analytic hierarchy process (AHP) to prioritise
auditing tasks for large scale software systems, Journal of Systems Management 44,
26 ± 31.
Zahedi F., 1986, The analytic hierarchy processÐ a survey of the method and its
applications, Interfaces 16, 96 ± 108.
# AAANZ, 2000