IN THE FILE UPLOAD PROVIDED THAT IS THE READING OF THE WEEK, I COULD NOT ADD IT BY DOWNLOADED I HAD TO COPY/PASTE I WILL DROP THE TITLE AND AUTHORS BELOW SO THAT IT CAN BE LOOKED UP IF THAT IS EASIER!!

AUTHOR:  Chang, S. I., Yen, D. C., Chang, I. C., & Jan, D. 

JOURNAL TITILE :  Information & Management

PUBLICATION: 2014

VOLUME: 51

ISSUE : 2

START PAGE: 187 END PAGE 205

INSTRUCTIONS!!!

A fundamental concept in compliance management is the concept of material weaknesses. There are many examples of material weaknesses, such as inadequate segregation of duties for security professionals, incomplete or inadequate documentation for the application of a control, lack of training, or security clearance of those who are responsible for assigned duties.

In this discussion, review the literature and discuss some control and a possible material weakness that could result from not adequately managing that control. Demonstrate your ability to do critical thinking. Briefly discuss the advantages and disadvantages of assurance control. Make sure to use support from the literature.

Abstract After the occurrence of numerous worldwide financial scandals, the importance of related issues such as internal control and information security has greatly increased. This study develops an internal control framework that can be applied within an enterprise resource planning (ERP) system. A literature review is first conducted to examine the necessary forms of internal control in information technology (IT) systems. The control criteria for the establishment of the internal control framework are then constructed. A case study is conducted to verify the feasibility of the established framework. This study proposes a 12-dimensional framework with 37 control items aimed at helping auditors perform effective audits by inspecting essential internal control points in ERP systems. The proposed framework allows companies to enhance IT audit efficiency and mitigates control risk. Moreover, companies that refer to this framework and consider the limitations of their own IT management can establish a more robust IT management mechanism. Keywords Internal control framework Enterprise resource planning IT control 1. Introduction The popularity of information technology (IT) applications has increased reliance on computers for processing business transactions. Companies adopt IT systems to improve their operations. Surveys on the collaborative operations of IT systems conducted by the Market Intelligence and Consulting Institute [42] indicate that the enterprise resource planning (ERP) system is the most widely adopted IT system among large companies. Given that ERP is a popular and all-encompassing information system utilized by many organizations and because of the increased consideration of the risks associated with IT, information system security and internal control related to information systems have greatly increased [17], [45], [63], [75]. The Committee of Sponsoring Organizations of the Treadway Commission (COSO) defines internal control as “a process, effected by an entity's board, management, and other personnel, designed to provide reasonable assurance regarding the achievement of objectives such as effectiveness and efficiency of operation, reliability of financial reporting, and compliance with regulation” [15]. The internal control related to information systems is commonly referred to as IT control and is composed of controls (i.e., policies and procedures) over the organizational IT infrastructure and systems [47], [63]. IT control consists of general and application controls. General controls refer to the relevant controls designed to ensure that an entity's control environment is well managed and applied to all sizes of systems ranging from large mainframe systems to client/server systems and to desktop and/or laptop computer systems. Application controls include input, processing, and output control based on the flow of data processing. In other words, application controls focus on the accuracy, completeness, validity, and authorization of the data captured, entered in the system, processed, stored, transmitted to other systems, and reported [54]. Further, general controls can be used to support the application controls and, hence, allow the smooth operation of the information system [22]. Given that financial reporting in many entities is based on information systems such as ERP systems, IT controls help entities achieve the objective of internal control. Similar to information security, IT controls can also manage and protect information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction [68]. An attack on information generally leads to the theft of confidential data, financial fraud, incapacitated web servers, and corrupted operational data [27], which all influence the accuracy and reliability of the financial data derived from the information system [75]. If entities fail to establish proper information security, they cannot guarantee the accuracy and reliability of their financial data [51]. ERP built-in control features may positively impact the effectiveness of internal controls over financial reporting. However, ERP does not necessarily safeguard against some deliberate system manipulations, for example, a few control features might not be activated in a timely manner in the implementation stage [45]. Further, to manipulate the date to perform earnings management, top managers may attempt to override some control features [6]. Following a number of reported business scandals, investors are beginning to question the accuracy of financial reports, including those generated by major companies around the world. In fact, investor confidence in the accuracy of financial reports and the shared holding positions of large companies has collapsed over recent years [56]. Durfee [18] emphasizes that an announcement of material weakness in the internal control system may result in a drop in stock prices, an increase in share volume, and the loss of chief financial positions. Goel and Shawky [26] also indicate that announcements of security breaches would decrease the market share of firms. Conversely, effective internal control can help firms to achieve their expected financial goals, maintain precise records of daily transactions, and produce accurate financial statements [20]. The accuracy and reliability of data within the ERP system are critical to ensure the transparency of the company's situation at all times, to help rebuild investor confidence, and to ensure low cost of capital [3]. Software vendors establish “built-in” control within ERP systems [45]. Companies also have an internal control framework in their ERP systems. Management is required to establish the framework, especially when a company is publicly listed. Companies constantly audit the effectiveness of their ERP system's internal control. Thus, an increasing number of companies have started to focus on the implementation of effective controls in their ERP systems while simultaneously providing management and external auditors a suitable framework within which to assess the ERP system's internal control. COSO released a report entitled “Internal Control-Integrated Framework” [15] in 1992 in an attempt to illustrate a systematic framework for internal control. However, the report failed to list supplemental criteria in the implementation and assessment of IT controls [49]. Referring to specific control items would allow management and auditors to execute IT control procedures [29]. However, IT control procedures not only consider the environment within the entity but also control as it relates to the external environment [66]. In addition, given the minimal compliance guidance in the use of IT established by the government, the interpretation of the scope and nature of the IT environment is inconsistent [8]. These limitations increase the difficulty of compliance. Despite the importance of deploying proper internal control frameworks to fully develop the effectiveness of the ERP system, only a few academic studies have assessed this issue. Accordingly, this study derives its primary research question: what are the types of internal control that must be considered when auditing an ERP system? The primary objective of this study is to develop a preliminary internal control framework for application in an ERP system. 2. Research background The growing awareness of IT's role in managing knowledge derived from information systems has caused the production of accurate and relevant information to become the focus of studies on information systems such as accounting information systems (AIS) and management information systems (MIS) [76]. IT governance has been recently discussed and has gained attention; IT governance is “used to describe how those persons entrusted with governance of an entity will consider IT in this supervision, monitoring, control, and direction of the entity” [32]. Well-defined controls are considered to be an imperative and necessary part of IT governance. This study attempts to establish good internal control standards for ERP systems by proposing an internal control framework for such systems. Three subtopics are discussed in this section. The first subsection describes system security and internal controls in the ERP system. The second subsection introduces the audit and inspection challenges associated with the ERP system. The third subsection presents and discusses the internal control framework. 2.1. System security and internal controls in the ERP system An increasing number of firms depend on ERP to address operational transactions. Therefore, information system security must be emphasized, especially in financial transactions [70], [73]. Walters [75] states that many information system threats, such as unauthorized access and system vulnerability attacks, influence the accuracy and reliability of the financial data derived from information systems. Information security protects and controls IT resources and ensures the accuracy and reliability of information [1]. Van de Riet et al. [69] note a number of security aspects associated with an ERP system; these aspects include security policy, user authentication, authorization, time restrictions, log and trace, and database security. Information security control maintains the reliability of the information system resource and the availability and integrity of financial data. Thus, information security control is closely linked with information security and internal controls. After the occurrence of numerous worldwide financial scandals, company management teams and auditors are now required to take responsibility for their respective financial reports. The effectiveness of internal control has been emphasized during this decade [52]. If firms lack the proper level and types of information security, they cannot ensure the effectiveness of their internal controls and the integrity of their financial data [51]. Thus, identifying the necessary control-related considerations in an ERP system is an important initial task for management and auditors. 2.2. Audit and inspection challenges in the ERP system The introduction of a new information system in a company may generate a new risk that is different from the risks initially associated with the legacy framework: the risks that accompany new framework operations may not be similar to those of the original system [50]. Reengineering business processes and the organizational changes brought about by the introduction of a new system may also lead to changes in the control requirements of a company in terms of ERP [11]. Problems frequently associated with ERP systems are generally contained. Such issues include business interruption, process interdependency, network security, database security, application security, and overall internal controls [31]. Therefore, many key aspects of the risk control environment must be considered [56]. Glover et al. [25] suggest that internal auditors consider the relevant risks and controls required for system planning based on their knowledge of risk management and of the internal risks present in the company during the introduction of the ERP system. Auditors and inspectors should first understand the basic architecture of the ERP system to effectively exert internal control over it [2], [9]. In the comprehensive application of the IT environment, “owning” the control framework can help auditors to evaluate the effectiveness of IT control and decide on an auditing strategy and program. The control framework can also enhance the efficiency of IT control evaluation and mitigate the audit risk for auditors [29]. 2.3. Internal control framework Management and the auditors must follow a suitable and holistic internal control framework to ensure the effectiveness of internal control in a firm. COSO released a report entitled “Internal Control-Integrated Framework” and recommended that this report be utilized by companies, auditors, regulating agencies, and educational institutions [15]. The conceptual model of the report indicates that internal control objectives require five components of control, namely, the control environment, risk assessment, control activities, information and communication, and monitoring. However, the framework provided by COSO focuses on high-level guidance for internal controls and does not provide the detailed control objectives that auditors require in the design of audit tests [49]. Moreover, the framework does not address the specific risks and complexities of IT [14]. An organization and its auditor require a comprehensive framework to properly adapt to the current IT auditing environment and to comply with regulations [23], [66]. Transactions involving information systems require particular control standards and criteria because the computerization of business transactions leads to the digitization of audit evidence, resulting in difficulties in following audit trails [41]. Thus, IT internal control usually includes the following procedures: (1) general controls, which refer to the relevant control measures associated with EDP; and (2) application controls or the division of input, processing, and output controls based on the flow of data processing. In this digital age, the absence of information security in a particular company implies that the entire company is built on a fragile foundation such that it cannot survive any related internal control tests [4]. Information systems in enterprises require many internal controls due to the pervasive implementation of IT and the need to minimize problems. The complexity of modern systems can overwhelm auditors and management if no appropriate guidance is provided [66]. Hence, auditors and management should increase their understanding of the IT environment and related IT processes and controls because they must periodically perform control procedures [44], [47]. Given that the two control types utilized at present cannot effectively or completely regulate the robustness of an internal control framework, especially when incorporated in the current information systems, numerous institutions have established their own sets of criteria for information security. A series of standards and criteria such as the British Standard (BS7799) and the Control Objectives for Information and Related Technology (COBIT) are employed by organizations. COBIT complements the COSO enterprise framework by assessing internal control and balanced risks in IT-intensive environments [33], [53]. Huang et al. [29] established an IT control evaluation model that includes control objectives. Referring to specific control items allows management and auditors to execute control procedures. However, despite the importance of deploying proper internal control frameworks, only a few academic studies have been conducted to fully develop the effectiveness of the ERP system. The present study aims to develop a preliminary internal control framework for application in ERP systems to bridge this gap. 3. Research methodology and design The research flow presented in this study utilized a theoretical strategy based on the V structure developed by Gowin [48] (Fig. 1). The interactions between the two sides of the structure (i.e., theoretical and methodological) merge relevant concepts and methods to achieve the proposed research goals [48]. Following the procedures listed on the “theoretical” side, the items related to IT control were summarized by studying the previous research. A literature review is thus conducted prior to the development of an internal control framework for ERP systems. To this end, two steps were performed in the literature review: collecting literature from the related sources and conducting coding procedures. Specifically, the relevant literature was gathered from the following sources: (1)IT controls for the internal use of companies. The data gathered are expected to be within the scope of the internal use of companies and can be compiled with the current internal control bylaws of corporate information systems; (2)Information security organization bylaws. This study refers to the regulations and criteria of COBIT, and BS7799 in particular, and includes all information systems. Both references are important, as they have been adopted by many companies worldwide [66]; and (3)Academic literature. Upon the completion of the initially constructed theoretical model and prior to conducting the case study, control items were established that met the requirements for the application of the model to the ERP system. Expert questionnaires were administered in this process. The main purpose for utilizing the expert questionnaires is to ensure and enhance the content validity of each measurement construct and to bridge the gap between the presented literature for application and the control items in actual practice. The measurement constructs and item indicators were screened separately to determine the internal control issues prevalent in the ERP system and to enhance the quality of the examination process and gain deeper insights. Next, following the procedures outlined on the “practical” side, an empirical case study was then conducted to investigate the feasibility of the proposed framework derived from the literature review and the questionnaires. The case study included “how” and “why” questions [79] and a pre-identified company was selected for the case study. In addition, the case study included steps related to design, preparation, collection, analysis, and sharing [79]. Not only was the case design identified in the design step, but the unit of case study was also described in detail in this step. 4. Construction of the preliminary framework for the internal controls of the ERP system The Science Direct database was utilized to search for the relevant academic literature. The main criteria for this search include the following items: (1)The keywords or the abstracts must have the words “information security” or “internal control”; (2)Literature must be related to the information field; and (3)Studies should be published between 2003 and 2007 because numerous financial scandals emerged worldwide primarily after 2002, bringing the issue of internal control to the forefront during this aforementioned period. Consequently, several regulations that required management to assess their enterprise internal controls were proposed, and auditors were also asked to determine whether their client's internal control assessment reporting was adequate. Therefore, the studies collected in this research are limited to this aforementioned period to investigate what was discussed or explored during this specific time window. Conceptualized results from 30 relevant publications were collected based on the abovementioned criteria. The collected results are shown in Table 1. A detailed analysis was also performed to present a complete and consistent list of internal control items for ERP. The preliminary model was constructed based on the literature review. The entire process was roughly divided into three steps as follows: (1) open coding, (2) axial coding, and (3) selective coding. 4.1. Open coding Open coding was performed for the literature content that satisfied the criteria mentioned above. Section extraction was performed; the sections identified as relevant to the internal controls of the information operations or those that obviously indicate the components of IT control of the information operations are coded. Coding was conducted to classify the studies from A to C. The codes derived from IT control for the internal use of companies, information security organization bylaws, and academic literature were classified as A, B, and C, respectively. For example, “C Company – Computerized Information System ICE” includes a section that addresses internal regulations. More specifically, this section states, “going online requires test reports or passing of tests.” This description can thus be conceptualized and coded into three factors (i.e., A216 whether test documents exist, A217 whether independent test environments exist, or A218 whether they have been verified by users). A total of 670 concepts were derived through this process. Accurate and complex interpretations were established as particular phenomena. For instance, codes A78, A108, A114, A115, A177, A192, A252, B15, B16, B17, B31, B46, B104, B154, B162, C40, C61, C87, C114, C158, C170, and C219 describe anomalies in the information system, how the information department is contacted and informed, how the information department rules out anomalies, and how information security incidents are addressed. Thus, these codes (concepts) were grouped in the domain of “whether procedures exist to report disasters.” Other concepts were translated into domains according to the same rule; 66 domains were established as key internal control issues based on the 670 concepts determined in the open coding process. 4.2. Axial coding Axial coding is usually conducted after open coding. This stage aims to recompose the distributed data into new methods such that the classifications and sub-classifications become related to one another. The 66 domains of the coded entries were further classified into dimensions. For example, the domains “whether relevant control procedures exist regarding system outsourcing” and “whether contracts are signed for system outsourcing” are related to outsourcing operation control and are imperative for managing system outsourcing for an organization. Therefore, these domains were classified into the dimension of “control of outsourced operations.” The results of axial coding are summarized in Table 2. 4.3. Selective coding Axial coding consolidates complex data and is the foundation of selective coding. Selective coding is conducted to systematically explain a selected core category, verify the relationship of the primary and other classifications, and fill the gap for supplements or developments required for individual classifications [64]. Based on the internal controls and the analysis of relevant literature, 66 key domains that influence the internal control of information systems were identified. The domains integrated through axial coding were re-classified as single key domains in selective coding. For example, the domains “whether anti-virus measures are used” and “whether firewalls are used,” were merged into “whether information equipment is protected with security measures,” given that both are related to security measures for the information equipment. Subsequently, 51 key domains were established. These domains function as internal control items. 4.4. Expert questionnaires Upon the construction of preliminary internal control items based on the literature, the methodology and validation process developed by Lawshe [37] was adopted. The adoption of this methodology and validation process enabled the collection of opinions from experts with extensive experience in the establishment, maintenance, and auditing processes of ERP systems. Questionnaires were distributed to gather opinions from the experts who are responsible for corporate functions (including internal audit and information), handle external audits (accounting firms), and work in partner companies regarding the introduction of ERP systems. The backgrounds of the participating experts are shown in Table 3. The control dimensions and items were screened to determine those suitable for the ERP system. Both theoretical and actual application are expected to increase the validity, extent, and practicality of this study, thereby achieving the research purpose of constructing internal control in an ERP system. As described previously, a literature review was conducted and 51 key items were identified for the internal control of ERP systems. Fourteen items were considered to be unimportant and were deleted after calculating and comparing the CVR values derived from the questionnaires. The remaining 37 control items were generalized and consolidated. The preliminary internal control items were further modified by referring to the suggestions provided by the expert respondents. Table 5 shows the modified internal control framework. 5. Empirical findings on internal control for the ERP system This section provides a brief description of the practices employed by the case company. The selected company was established in 1996 and is dedicated to the development and manufacture of wireless telecommunication products. The company aspires to become the world leader in the area of wireless telecommunications by exerting efforts in research and development (R&D) that are aimed at improving technology. Its products are divided into three lines: satellite telecommunications, mobile telecommunications, and wireless network equipment. The managers in the company can keep abreast of the key technologies associated with their product lines in accordance with the changes occurring in the marketplace through their extensive experience and background in technology. The company is thus capable of developing relevant niche products to meet market demand by quickly integrating telecommunication technologies into their product lines. This company provides comprehensive wireless and telecommunication products and timely after-sale service to its customers. With its focus on R&D for new technologies and the extensive in-house development of the accompanying software and hardware, the company designs and develops its own products effectively. In fact, the company has achieved their best economies of scale by establishing an increasingly comprehensive product line. As a result, the company is capable of maintaining its competitive advantage in the wireless telecommunications industry. The computer auditors working for the accountant were invited to participate in this study. Interviews were also conducted to study the actual company's operations, collecting the current internal control information as primary data. The company was asked to provide secondary data (i.e., relevant operation documents and files) for the analysis and synthesis of the research findings. Table 6 summarizes the background of all of the interviewees. A select group of public companies that introduced ERP systems was filtered for the case study. The company targeted for interview is engaged in the R&D and manufacture of wireless telecommunication products. The company actually replaced its Baan computer system with an Oracle ERP system in 2006. The interviewees comprised an internal auditing supervisor who facilitates two different ERP systems, an assistant manager in the MIS Department who maintains and deploys these two different systems, and a computer auditing manager who works for the accounting firm to audit the information system of this company. These three individuals are responsible for the ERP audit. All three interviewees have relevant experience and background in the auditing and maintenance of ERP systems. A case study on a public company using the obtained audited financial reports was conducted. A manufacturing firm similar to this telecommunications company can be regarded to be a representative case for companies in other industries. For this reason, this case result can be employed and justified as a rationale for the use of a single case [79]. Specifically, the case study protocol was developed in the preparation step. Primary data about the actual operations of the company were gathered on-site in the collection step, while secondary data were utilized to address the main objectives of this research. Further, data were gathered, analyzed, and collated prior to conducting the interviews with personnel who are experts in IT control and have worked with the independent accounting firm that maintains a relationship with the company selected in the case study. The feasibility of the internal control items that were applied in the planning of the ERP system was evaluated in the analysis and sharing steps. Finally, the results and findings were presented. The control items and information auditing of the ERP system in the case company were reviewed. The feasibility of using the control items constructed for the company was also evaluated. 5.1. Practices within the case company Two auditors are employed in the audit department of the case company. Their tasks include inspecting domestic and overseas affiliates in the same group. In addition to adjusting the internal control framework originally based on the “eight major cycles,” the two auditors also perform internal audits and execute special projects assigned by their supervisors because these tasks are part of their job description. In auditing ERP systems, the focus is on soft control. The company's MIS department has established a division called “ERP System Services.” All seven employees in this division are responsible for the maintenance of the ERP system. Their major responsibilities include maintaining the normal operations of the system, solving all problems raised by users, and meeting the operational demands of users. These employees perform ordinary control tests and passive checks on requests from the auditing department as ERP system audits. 5.2. Control items within the case company The current audit checklist for ERP systems was originally based on the control items listed by the company headquarters. The checklist was later modified in accordance with the actual situations experienced by the company. The key control items comply with the criteria set by the authority. However, these control items are not fixed and are regularly reviewed for appropriateness. Director Chen said, “After the introduction of the new Oracle ERP system in 2006, the company conducted timely adjustments to ascertain control items.” 5.3. Information auditing of the ERP system The internal auditors of the case company focus their audit on soft control items in the ERP system such as accounts, passwords, authorization, and remote access. The auditors are only equipped to perform soft audits. Other forms of audit are delegated to the MIS department, as the internal auditors perform these tasks through collaborative procedures. The definition of the items pertaining to overall control is modified by referring to previous audit records. For example, each audit is performed on a regular basis (i.e., once a year) to minimize risk. However, the items with poor records have a high-risk profile and are therefore analyzed under strict standards (i.e., conducted quarterly or every semester). Given that financial reports are generated by the company's ERP system, the reporting accounts must be spot-checked as a form of internal control to reduce confirmatory audit risks. The computer audit personnel of the accounting firm check the system setups and the ordinary control measures of the company. Manager Li said, “Basically, auditing for the ERP system within the company is mainly focused on general and basic checking of the Oracle ERP architecture in the UNIX operating system, Oracle database, and network. These are the critical points of our audit.” If the audit results indicate that the internal control of a company is appropriate, then the accountants may reduce the required number of spot-checking procedures. Auditing procedures should be modified on a timely basis in accordance with the actual demands of companies. The company under study was able to amend system faults and failures pointed out by its external auditors. This review process should be performed continuously to establish a robust internal control structure. The difficulties encountered by the company's ERP system auditors are caused by lack of IT training. Consequently, the company can focus only on software controls. With regard to other forms of audit, the auditors remain dependent on the MIS department for effectiveness. However, despite the IT knowledge of the personnel in the MIS department, these MIS personnel cannot perform audits effectively owing to control issues posed by individuals, control measure requirements, and related auditing concepts. External auditors continue to believe that most companies do not have any personnel dedicated to computer audits. Manager Li said, “Currently, the competent authority or relevant institutions are not certified with regard to computer audits. In addition, most auditors claim they lack sufficient IT training. Given the limited computer audit talents, very few companies have established a stable computer audit department.” In sum, the challenges involving ERP systems include whether auditors can clearly understand the operational flows of the company and its overall information system environment to effectively manage both the behavioral risks caused by human factors and the technical risks integrated in a system. For auditors who do not have expertise in both audit (accounting) and IT, the auditing processes in an ERP environment pose imminent obstacles and challenges. 5.4. Understanding the feasibility of the control items Both interviewees concurred that the control items constructed in this study meet most of the requirements. However, a suitable list of control items should consider the infrastructure of the company, including the company scale and number of MIS employees. These considerations are important because individual control points have important roles in legacy information architecture. Accordingly, a number of control items cannot completely meet the specifications of the company under study owing to limitations in identifying infrastructure concepts such as whether the responsibilities of MIS personnel are clearly defined. Assistant Manager Lin said, “This proposed framework seems suitable for my company, but the premise must consider the company's structure. For example, the company did not do well in distinguishing the responsibilities of IT personnel. The main reason is due to the lack of manpower and information unit personnel. Therefore, some control items within this proposed framework may be excluded. Nevertheless, the framework is still useful for my company.” The case company suggested that several control items be transformed to attainable targets in the future. The interviewees were requested to state their opinions regarding the appropriateness and importance of the control items to understand the feasibility of the proposed framework. Table 7 provides a summary of the company's evaluation of the control items constructed in this study. The list shows that the MIS department is particularly focused on “system development and control over program modifications” and “access control of programs and data,” further proving that the list is applicable and can thus serve as future reference. With respect to the dimension “system development and control over program modifications,” Assistant Manager Lin said, “If the MIS department could manage developed or modified system programs effectively, it could help improve the credibility of information and preciseness of data.” Two interviewees presented their views on the dimension “access control of programs and data.” Director Chen said, “Because of the critical nature of the data and program within the company, appropriate control strategies and controls should be set for IT systems through access control policies. Only authorized users should be provided access to information system assets.” Assistant Manager Lin said, “The current system login in the company is appropriately controlled by access control procedures such as passwords. This form of logical access control over information is primarily required within the company to protect information against acts such as unauthorized creation and modification as well as inadvertent errors.” With respect to the audit of control items, auditors believe that in principle, general audits should be conducted annually. However, several dimensions such as “access control of programs and data” require timely system auditing procedures. Jointly auditing these dimensions and those for the eight-cycle operations is sometimes necessary. Auditing in such situations is conducted not only annually but also rather promptly in conjunction with other procedures. External auditors believe that the current self-control mechanisms of the company's internal IT department involve two dimensions (i.e., “system development and control over program modifications” and “access control of programs and data”), which should be audited internally at least on a quarterly basis. As for the other dimensions, auditing may be conducted every semester depending on the audit's impact on the company processes. The interviewees in the case study agreed that the constructed control items could effectively assist the company in the audit and control of its ERP system. Director Chen said, “This proposed framework is great and comprehensive. A few control items are not available in the company at the moment, and this framework can be utilized to adjust the present version of the company.” 5.5. Discussion of findings As per the earlier discussion, several findings are rather interesting. In general, internal control frameworks for ERP existed in this case company that could help related personnel to effectively manage and track the outcomes of IT control. This proposed framework is relatively rigorous, complete and more easily acceptable in terms of its logic. Although some control items are not suitable for the case company, this proposed framework can be used repeatedly to adjust/improve the present version. According to the results of our case study, IT general control has been reasonably emphasized because it supports the resulting application processing. However, different industries and company sizes may provide different perspectives about determining the priority of control items. For instance, small-sized companies often use the Microsoft Office software package to handle business processing, and in this case, some of control items within this proposed framework may need to be amended. Nonetheless, this proposed framework can still be employed to greatly assist the case company to execute IT control and perform IT governance. 6. Conclusions Given that the ERP system is widely utilized in many organizations, the relevant information on security and internal controls must be continuously prioritized. Stakeholders wish to feel confident that internal control within the organization is executed effectively to reduce the possibility of business failure or fraudulent financial reporting [38]. However, improper management of control procedures in the computer environment of a company may result in significant financial reporting errors and financial losses. Thus, this study developed an ERP internal control framework to assist stakeholders in verifying the effectiveness of their respective companies’ internal control mechanisms. Literature related to IT controls for the internal use of companies, various information security organization bylaws, and academic literature were reviewed. Open, axial, and selective coding were performed to finalize the 51 key items associated with ERP internal control. Questionnaires were administered to confirm whether the abovementioned items are suitable for and essential to the ERP system. Out of the 51 control items, only 37 were utilized in the preliminary model. A case study was then conducted to verify the feasibility of the proposed framework. Our findings have provided some implications for future research. The internal control matrix could be regarded as a common method to represent internal controls for specific business processes within the SOX audit environment, which includes internal control objectives [24]. Only a few studies have developed a structured, systematic approach that stakeholders can utilize. The proposed framework was derived from several rigorous methods and contained necessary control dimensions and items that can be utilized for ERP control and improvement of IT governance. Compared with previous studies on internal control frameworks, including Jo et al. [34] and Lin et al. [40], the case study approach has been recommended for this stream of studies simply because of the need for detailed and contextual information from the entity stakeholders. Further, the extant research utilized experts from CPA firms as a research subject; this study recruited several participants from the case company to disseminate their thoughts. Because this study embraced the application controls to broaden the IT control domain, the obtained outcome may complete Huang's [29] work because its only focus is placed on the general IT controls. A previous study indicated that existing internal control frameworks do not consider important control aspects such as the environment outside of the organization [66]. The dimension “control of outsourced operations” in the proposed framework strengthens the ERP internal control points. A few empirical studies examined IT control weakness and IT operation risk [5], [36], [39]. The study of Li et al. [39] provided empirical evidence regarding IT-related material weakness based on internal and external governance. Further, Klamm and Watson [36] examined IT material weakness based on the internal control-integrated framework proposed by COSO. In summary, this proposed framework may be utilized to assess ERP control. The proposed framework can also be applied to the external auditing profession. External auditors can use this framework to communicate logically with their clients. The responsibility of the certified public accountants to attest to the effectiveness of their clients’ internal control system is clearly regulated. An auditor in an IT environment must have a good understanding of internal control. If an auditor does not have a proper understanding of this concept, auditing work may incur many uncertainties and risks. From the perspective of a business entity, acquiring effective internal control is a complex task. However, internal control can be facilitated and maintained if a proper framework is adopted. The proposed framework is a supplement to the COSO framework [15]. This comprehensive framework facilitates the construction of detailed controls for ERP systems. Among the 12 dimensions constructed in this study, only the dimension “access control of program and data” was unanimously recognized by all interviewees as an important criterion in information risk management. This finding is similar to that of Wallace et al. [73], thereby proving that access control is the most common and highest priority control in practice. When an entity establishes proper access control, the probability of an attacker obtaining unauthorized system access decreases [59]. However, most of the items in the proposed framework were regarded as being moderately important. The listed company under study should therefore exercise compliance, and its stakeholders should assume more responsibility for protecting the information system. This result confirms the results of Wallace et al. [73]. With the proposed framework, which includes comprehensive control dimensions or items, internal auditors and MIS department chiefs can verify the effectiveness of internal control through a complete mechanism to comply with government regulations. In other words, internal auditors and MIS department chiefs can develop their relationship and communicate the effectiveness of internal control by referring to the proposed framework. According to Wallace et al. [73], a good relationship between an organization's internal auditors and MIS department chiefs helps the organization comply with IT-related internal control requirements. Several control items are considered to be high-priority items. Perhaps stakeholders should prioritize high-risk control points. This process not only enhances audit efficiency but also easily identifies the weakness of internal control. Companies must consider the limitations inherent in their infrastructures in terms of internal control management to determine the most important control points [58]. These recommended improvements can enable companies to build robust auditing structures. Small and medium-sized enterprises (SMEs) need to implement information systems in their operations to cooperate with large firms. Most large firms ask to review and audit downstream SMEs to ensure system security. SMEs may therefore consider the proposed framework and adjust several control items according to their own characteristics to determine their IT control weaknesses in advance. The present study has limitations. Thirty relevant studies were selected and reviewed to construct the ERP system internal control framework. This study did not prove that the coding process reached saturation; other control items might have been missed. Furthermore, despite recruiting 18 qualified experts to confirm the control items derived from the literature review, other experts might have concluded otherwise. Another limitation of this study is external validity. The explanatory power of this study may be limited because it adopts the single case method. This proposed framework with control items is generic in nature. In other words, it could be applied to the majority of entities regardless of their size or industry. A few industries with a higher security consideration for their IT environment (i.e., the banking sector) will be able to expand this framework and add other new control dimensions and items to provide additional insights to this subject area. Several future research avenues are discussed as follows. First, given the increasing number of published studies on ERP internal control, follow-up research could analyze these streamed studies to add control items and refine the proposed framework. Second, several control items in the proposed framework may be extended to other systems, organizations (i.e., government agencies), and industries. Future studies could examine the usefulness and feasibility of the proposed framework. References [1]American Institute of Certified Public Accountants (AICPA) Audit Risk and Materiality in Considering an Audit, SAS No. 94 AICPA, New York (1983) Google Scholar [2]American Institute of Certified Public Accountants (AICPA) The Effect of Information Technology on the Auditors’ Consideration of Internal Control in a Financial Statement Audit, SAS No. 94 AICPA, New York (2001) Google Scholar [3]H. Ashbaugh-Skaife The effect of SOX internal control deficiencies on firm risk and cost of equity Journal of Accounting Research, 47 (1) (2009), pp. 1-43  View at publisher   This article is free to access. View in ScopusGoogle Scholar [4]J.C. Bedard, L.E. Graham The effects of decision aid orientation on risk factor identification and audit test planning Auditing, 21 (2) (2002), pp. 39-65 View at publisher  CrossrefView in ScopusGoogle Scholar [5]M. Benaroch, A. Chernobai, J. Goldstein An internal control perspective on the market value consequences of IT operational risk events International Journal of Accounting Information Systems, 13 (4) (2012), pp. 357-381 View PDFView articleView in ScopusGoogle Scholar [6]J. Brazel, L. Dang The effect of ERP system implementations on the management of earnings and earnings release dates Journal of Information Systems, 22 (2) (2008), pp. 1-21 View at publisher  CrossrefGoogle Scholar [7]British Standards Institution (BSI) Information Security Management – Part 2: Specification for Information Security Management Systems British Standards Institution, London (2002) Google Scholar [8]W. Brown, F. Nasuti Sarbanes–Oxley and enterprise security: IT governance – what it takes to get the job done Security Management Practices, 14 (5) (2002), pp. 15-28 View at publisher  CrossrefGoogle Scholar [9]L. Calabro Looking under the hood CFO, 20 (6) (2004), pp. 97-98 Google Scholar [10]V. Cerullo, M.J. Cerullo Business continuity planning: a comprehensive approach Information Systems Management, 21 (3) (2004), pp. 70-78 View at publisher  CrossrefView in ScopusGoogle Scholar [11]S.I. Chang, G.G. Gable A comparative analysis of major ERP lifecycle implementation, management and support issues in Queensland government Journal of Global Information Management, 10 (3) (2002), pp. 36-54 View at publisher  CrossrefView in ScopusGoogle Scholar [12]J. Chau Application security – it all starts from here Computer Fraud & Security, 2006 (6) (2006), pp. 7-9 View PDFView articleCrossrefView in ScopusGoogle Scholar [13]M. Coe Trust services: a better way to evaluate IT controls Journal of Accountancy, 199 (3) (2005), pp. 69-75 Google Scholar [14]J.L. Colbert, P.L. Bowen A comparison of internal controls: COBIT, SAC, COSO, and SAS 55/78 IS Audit and Control Journal, 4 (1996), pp. 26-35 Google Scholar [15]Committee of Sponsoring Organizations of the Treadway Commission (COSO) Internal Control – Integrated Framework AICPA, New York (1992) Google Scholar [16]A. Daveiga, J.H.P. Eloff An information security governance framework Information Systems Management, 24 (4) (2007), pp. 361-372   View in ScopusGoogle Scholar [17]G. Dhillon Principles of Information System Security: Text and Cases John Wiley and Sons, New Jersey (2007) Google Scholar [18]D. Durfee The 411 on 404: Reporting a material weakness in controls can cost shareholders millions and some CFOs their jobs CFO Magazine (2005) Google Scholar [19]J.H.P. Eloff, M.M. Eloff Information security architecture Computer Fraud & Security, 2005 (11) (2005), pp. 10-16 View PDFView articleCrossrefView in ScopusGoogle Scholar [20]Ernst & Young Preparing for Internal Control Reporting: A Guide for Management's Assessment Under Section 404 of the Sarbanes–Oxley Act Ernst, Young LLP (2002) Google Scholar [21]S. Flowerday, R. Von Solms Continuous auditing: verifying information integrity and providing assurances for financial reports Computer Fraud & Security, 2005 (7) (2005), pp. 12-16 View PDFView articleCrossrefView in ScopusGoogle Scholar [22]S. Flowerday, R. Von Solms Real-time information integrity = system integrity + data integrity + continuous assurance Computers and Security, 24 (8) (2005), pp. 604-613 View PDFView articleView in ScopusGoogle Scholar [23]C. Fox, P.C. Zonneveld IT Control Objectives for Sarbanes–Oxley: The Importance of IT in the Design, Implementation and Sustainability of Internal Control over Disclosure and Financial Reporting IT Governance Institute, Illinois (2003) Google Scholar [24]U.J. Gelinas Jr., R.B. Dull Accounting Information Systems (7th ed.), Thomson South-Western, Mason, OH (2008) Google Scholar [25]S. Glover, D. Prawitt, M. Rommy Implementing ERP Internal Auditor, 56 (1) (1999), pp. 40-47 Google Scholar [26]S. Goel, H.A. Shawky Estimating the market impact of security breach announcements on firm values Information & Management, 46 (7) (2009), pp. 404-410 View PDFView articleView in ScopusGoogle Scholar [27]L.A. Gordon, M.P. Leob, W. Lucyshyn, R. Richardson CSI/FBI Computer Crime and Security Survey Computer Security Institute (2005) Available at: www.gocsi.com Google Scholar [28]M. Gorge USB and other portable storage device usage: be aware of the risks to your corporate data in order to take pre-emptive and/or corrective action Computer Fraud & Security, 2005 (8) (2005), pp. 15-17 View PDFView articleCrossrefView in ScopusGoogle Scholar [29]S.M. Huang, W.H. Hung, D.C. Yen, I.C. Chang, D. Chiang Building the evaluation model of the IT general control for CPAs under enterprise risk management Decision Support Systems, 50 (4) (2011), pp. 692-701 View PDFView articleView in ScopusGoogle Scholar [30]P. Hunter Card systems: four million Hack – under the spotlight Computer Fraud & Security, 2005 (11) (2005), pp. 8-9 View PDFView articleCrossrefView in ScopusGoogle Scholar [31]J.E. Hunton, A.M. Wright, S. Wright Are financial auditors overconfident in their ability to assess risks associated with enterprise resource planning systems? Journal of Information Systems, 18 (2) (2004), pp. 7-28 View at publisher  CrossrefGoogle Scholar [32]IT Governance Institute (ITGI) Board briefing on IT governance (2003) Available at: http://www.itgi.org Google Scholar [33]IT Governance Institute (ITGI) Control Objectives, Management Guidelines, Maturity Models in CobiT 4.0 IT Governance Institute, Illinois (2005) Google Scholar [34]Y. Jo, J. Lee, J. Kim Influential factors for COBIT adoption intention: an empirical analysis International Journal of Contents, 6 (4) (2010), pp. 79-89 View at publisher  CrossrefGoogle Scholar [35]A. Jones The convergence of physical and electronic security Computer Fraud & Security, 2006 (3) (2006), pp. 12-14 View PDFView articleCrossrefView in ScopusGoogle Scholar [36]B.K. Klamm, M.W. Watson SOX 404 reported internal control weakness: a test of COSO framework components and information technology Journal of Information Systems, 23 (2) (2009), pp. 1-23 View at publisher  CrossrefView in ScopusGoogle Scholar [37]C.H. Lawshe A quantitative approach to content validity Personnel Psychology, 28 (4) (1975), pp. 563-575 View at publisher  CrossrefView in ScopusGoogle Scholar [38]C.M. Lehmann Internal controls: a compendium of short cases Issues in Accounting Education, 25 (4) (2010), pp. 741-754 View at publisher  CrossrefView in ScopusGoogle Scholar [39]C. Li, J.H. Lim, Q. Wang Internal and external influences on IT control governance International Journal of Accounting Information Systems, 8 (4) (2007), pp. 225-239 View PDFView articleView in ScopusGoogle Scholar [40]F. Lin, L. Guan, W. Fang Critical factors affecting the evaluation of information control systems with the COBIT framework: a study of CPA firms in Taiwan Emerging Markets Finance & Trade, 46 (1) (2010), pp. 42-55   View in ScopusGoogle Scholar [41]A. Mancuso Auditing standard board issues SAS No. 80 The CPA Journal, 66 (1997), p. 74 Google Scholar [42]Market Intelligence and Consulting Institute (MIC) Analysis of IT Applications for Large Companies in Taiwan Institute for Information Industry, Taipei (2009) Google Scholar [43]N. Marks The more things change Internal Auditor, 61 (4) (2004), pp. 60-64 Google Scholar [44]T.J. Mock, L. Sun, R.P. Srivastava, M. Vasarhelyi An evidential reasoning approach to Sarbanes–Oxley mandated internal control risk assessment International Journal of Accounting Information Systems, 10 (2) (2009), pp. 65-78 View PDFView articleView in ScopusGoogle Scholar [45]J.J. Morris The impact of enterprise resource planning (ERP) systems on the effectiveness of internal controls over financial reporting Journal of Information Systems, 25 (1) (2011), pp. 129-157 View at publisher  CrossrefView in ScopusGoogle Scholar [46]E. Myler, G. Broadbent ISO 17799: standard for security Information Management Journal, 40 (6) (2006), pp. 43-52 Google Scholar [47]C.S. Norman, M.D. Payne, V.P. Vendrzyk Assessing information technology general control risk: an instructional case Issues in Accounting Education, 24 (1) (2009), pp. 63-76 View at publisher  CrossrefView in ScopusGoogle Scholar [48]J.D. Novak, D.B. Gowin Learning How to Learn Cambridge University Press, NY (1989) Google Scholar [49]J.B. O’Donnell, Y. Rechtman Navigating the standards for information technology controls The CPA Journal, 75 (7) (2005), pp. 64-69 Google Scholar [50]D. O’Leary Enterprise Resource Planning Systems: Systems, Life Cycle, Electronic Commerce, and Risk Cambridge University Press, Cambridge (2000) Google Scholar [51]P. Proctor, J. Viganly The security implications of Sarbanes–Oxley Symantec Enterprise Solutions Webcast (2004) Available at: www.symantec.com/press/2004/n040218c.html Google Scholar [52]Public Company Accounting Oversight Board (PCAOB) An Audit of Internal Control over Financial Reporting Performed in Conjunction with an Audit of Financial Statement, Auditing Standard No. 2 PCAOB, Washington (2004) Google Scholar [53]M. Ramos Evaluate the control environment Journal of Accountancy, 197 (5) (2004), pp. 75-78 View at publisher  CrossrefGoogle Scholar [54]M.B. Romney, P.J. Steinbart Accounting Information Systems Pearson, Upper Saddle River, NJ (2009) Google Scholar [55]R. Saint-Germain Information security management best practice based on ISO/IEC 17799 Information Management Journal, 39 (4) (2005), pp. 60-66 Google Scholar [56]W. Sally, M.W. Arnold Information system assurance for enterprise resource planning system: unique risk considerations Journal of Information Systems, 16 (1) (2002), pp. 99-113 Google Scholar [57]W. She, B. Thurasingham Security for enterprise resource planning systems Information Systems Security, 16 (3) (2007), pp. 152-163 View at publisher  CrossrefView in ScopusGoogle Scholar [58]M. Siponen, R. Willison Information security management standards: problems and solutions Information & Management, 46 (5) (2009), pp. 267-270 View PDFView articleView in ScopusGoogle Scholar [59]P.J. Steinbart, R.L. Raschke, G. Gal, W.N. Dilla The relationship between internal audit and information security: an exploratory investigation International Journal of Accounting Information Systems, 13 (3) (2012), pp. 228-243 View PDFView articleView in ScopusGoogle Scholar [60]P. Stephenson Incident analysis and recovery Computer Fraud & Security, 2005 (3) (2005), pp. 17-19 View PDFView articleGoogle Scholar [61]P. Stephenson Ensuring consistent security implementation within a distributed and federated environment Computer Fraud & Security, 2006 (11) (2006), pp. 12-14 View PDFView articleCrossrefView in ScopusGoogle Scholar [62]A. Stewart On risk: perception and direction Computers and Security, 23 (5) (2004), pp. 362-370 View PDFView articleView in ScopusGoogle Scholar [63]M.D. Stoel, W.A. Muhanna IT internal control weaknesses and firm performance: an organizational liability lens International Journal of Accounting Information Systems, 12 (4) (2011), pp. 208-304 Google Scholar [64]A. Strauss Qualitative Analysis for Social Scientists Cambridge University Press, Cambridge (1987) Google Scholar [65]K.L. Thomson, R. Von Solms Towards an information security competence maturity model Computer Fraud & Security, 2006 (5) (2006), pp. 11-15 View PDFView articleCrossrefView in ScopusGoogle Scholar [66]B. Tuttle, S.D. Vandervelde An empirical examination of CobiT as an internal control framework for information technology International Journal of Accounting Information Systems, 8 (4) (2007), pp. 240-263 View PDFView articleView in ScopusGoogle Scholar [67]S. Tyson, L. Bean System access hotspots: are auditors ignoring danger Journal of Corporation Accounting and Finance, 16 (4) (2005), pp. 3-9 View at publisher  CrossrefView in ScopusGoogle Scholar [68]United States Code Public Printing and Documents: Definitions. Title 44, Section 3552 United States Code, Washington, DC (2008) Google Scholar [69]R. Van De Riet, W. Janssen, P. De Gruijter Security moving from database systems Database and Expert System Applications Proceedings (1998) Google Scholar [70]A. Vance, M. Siponen, S. Pahnila Motivating IS security compliance: insights from habit and protection motivation theory Information & Management, 49 (3–4) (2012), pp. 190-198 View PDFView articleView in ScopusGoogle Scholar [71]L. Volonino, G.H. Gessner Holistic compliance with Sarbanes–Oxley Communication of AIS, 14 (1) (2004), pp. 219-233 Google Scholar [72]S.H. Von Solms Information security governance – compliance management vs. operational management Computers and Security, 24 (6) (2005), pp. 443-447 View PDFView articleView in ScopusGoogle Scholar [73]L. Wallace, H. Lin, M.A. Cefaratti Information security and Sarbanes–Oxley compliance: an exploratory study Journal of Information Systems, 25 (1) (2011), pp. 185-211 View at publisher  CrossrefView in ScopusGoogle Scholar [74]L. Wallace, M. Keil, A. Rai Understanding software project risk: a cluster analysis Information & Management, 42 (1) (2004), pp. 115-125 View PDFView articleView in ScopusGoogle Scholar [75]L.M. Walters A draft of an information systems security and control course Journal of Information Systems, 21 (1) (2007), pp. 123-148 View at publisher  CrossrefGoogle Scholar [76]C.L. Wilkin, R.H. Chenhall A review of IT governance: a taxonomy to inform accounting information systems Journal of Information Systems, 24 (2) (2010), pp. 107-146 View at publisher  CrossrefView in ScopusGoogle Scholar [77]R. Williams Performing a successful UNIX audit Computer Fraud & Security, 2003 (8) (2003), pp. 11-12 View PDFView articleCrossrefView in ScopusGoogle Scholar [78]P. Wilson Risk control: a technical view Computer Fraud & Security, 2005 (5) (2005), pp. 8-11 View PDFView articleCrossrefView in ScopusGoogle Scholar [79]R.K. Yin Case Study Research – Design and Methods Sage, California (2009) Google Scholar