跳到主要內容

臺灣博碩士論文加值系統

(18.97.9.171) 您好!臺灣時間:2024/12/09 11:36
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:黃嘉鈴
研究生(外文):Jia-ling Huang
論文名稱:運用模糊理論及查核風險模式建立審計偵查風險的評估機制
論文名稱(外文):Applying Fuzzy Theory and Audit Risk Model on the Study of Assessment Methodology for Audit Detection Risk
指導教授:張碩毅張碩毅引用關係
學位類別:碩士
校院名稱:國立中正大學
系所名稱:會計所
學門:商業及管理學門
學類:會計學類
論文種類:學術論文
論文出版年:2006
畢業學年度:94
語文別:中文
論文頁數:184
中文關鍵詞:模糊理論偵查風險查核風險模式紮根理論德爾菲方法個案研究法
外文關鍵詞:Case studyDelphi methodGrounded theoryDetection riskFuzzy theoryAudit risk model
相關次數:
  • 被引用被引用:0
  • 點閱點閱:643
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:1
每個審計案件,查核人員皆冒著審計風險(Audit risk),擔負出具不當意見的可能性。審計委任的失敗與否深受查核規劃時決定蒐集的查核證據影響,而查核證據的多寡又決定在偵查風險(Detection risk)的程度,所以偵查風險的評估因素愈客觀、正確,則可降低查核的成本與查核失敗的威脅。因此,本研究希望能夠找出,相較於傳統偵查風險的決定方法,能夠更為精確評估偵查風險的模式,以提高審計品質降低審計失敗的可能性。
本研究首先利用紮根理論(Grounded theory)整理出53項國內外文獻提及的影響偵查風險的風險因素,接著採用德爾菲方法(Delphi method)篩選出審計實務專家一致認同的43項關鍵風險因素;最後,藉助模糊理論(Fuzzy theory)與查核風險模式(Audit risk model)建立評估偵查風險的機制,求算出偵查風險的風險程度,以幫助查核人員進一步決定其查核證據的蒐集數量,制訂初步查核策略。此外,為了驗證本研究所提出的評估偵查風險機制,本研究以個案研究法(Case study)成汀褌狳繫桴魖謘A確認本研究提出之機制的可用性及有效性。
本研究的研究貢獻為,首先本研究整理了學術界與審計實務界的認同之影響偵查風險評估時的43項關鍵風險因素,相信可以提供未來學者在研究查核規劃之風險辨別的參考,以及內、外部稽核人員在未來進行風險辨別時的參考依據。再來,本研究建構出一套相較於傳統評估方法更為精確、客觀的評估機制,提供給內、外部稽核人員在未來進行偵查風險的評估時使用,相信可以提升審計品質,並降低審計失敗的風險。最後,藉由本研究提出的將模糊理論應用在偵查風險的評估,相信可以激發未來研究審計議題的學者繼續投入模糊理論的研究,提供學術界另一個以模糊理論思考審計議題的方向。
Auditors face the audit risk and bear the legal liability in every audit case. The success of the audit case is related to the audit evidences during the audit plan period. And the quantity of the audit evidences is influenced by the degree of the Detection Risk. The more precise of the detection risk, the fewer threat of the audit failure. This research tries to create an approach to evaluate the detection risk more precisely than the traditional approach. The approach can improve the audit quality and reduce the probability of audit failure.
First, the research performs Grounded Theory to collect risk factors from the literatures and then uses the Delphi Method to sieve out the identified risk factors from the expert. Second, the research creates a mechanism to calculate the Detection Risk from these identified risk factors via the Audit Risk Model and Fuzzy Theory. The calculated Detection Risk can assist auditors to formulate the initial strategies of the audit case. This research uses the case study methodology to valid the feasibility of the whole approach.
The contributions of this research include:
1. The identified risk factors can be the references for future research.
2. The identified risk factors can be the references for the auditors.
3. The approach can improve the audit quality and reduce the probability of audit failure.
4. The fuzzy theory we use can guide a new road for future research about evaluating the audit risk.
摘要 I
Abstract II
目錄 III
目錄 III
圖目錄 VI
表目錄 VII
第一章 緒論 1
1.1. 研究背景與動機 1
1.2. 研究問題與目的 4
1.3. 研究策略 4
1.4. 論文架構 6
第二章 文獻探討 7
2.1. 查核規劃流程 7
2.1.1. 接受查核委任前之準備工作 7
2.1.2. 瞭解客戶之企業及產業 8
2.1.3. 評估客戶的經營風險 8
2.1.4. 執行初步的分析性程序 9
2.1.5. 設定重大性水準及評估可接受查核風險和固有風險 9
2.1.6. 瞭解內部控制並評估控制風險 10
2.1.7. 蒐集資訊評估舞弊風險 11
2.1.8. 發展整體查核計劃及查核程式 12
2.2. 查核風險 13
2.2.1. 查核風險的定義 13
2.2.2. 查核風險的組成 14
2.3. 查核風險模式 21
2.3.1. 查核風險模式的計算公式 21
2.3.2. 查核風險模式組成的重要性 21
2.3.3. 查核風險模式在實務界的應用 23
2.4. 本章小結 25
第三章 研究方法與設計 26
3.1. 運用紮根理論影響偵查風險的重要風險因素 27
3.1.1. 紮根理論之介紹 27
3.1.2. 紮根理論之研究設計 32
3.2. 運用德爾菲方法找出專家認同的影響偵查風險的關鍵因素 34
3.2.1. 德爾菲方法之介紹 34
3.2.2. 德爾菲方法之研究設計 38
3.3. 運用模糊理論建構偵查風險的評估機制 42
3.3.1. 模糊理論之介紹 42
3.3.2. 模糊理論之研究設計 49
3.4. 運用個案研究法驗證並提出偵查風險的評估機制 59
3.4.1. 個案研究法之介紹 59
3.4.2. 個案研究法之研究設計 63
3.5. 本章小結 65
第四章 偵查風險評估機制之建構 66
4.1. 紮根理論之整理結果 66
4.1.1. 開放性譯碼結果 69
4.1.2. 主軸譯碼結果 71
4.1.3. 選擇性譯碼結果 74
4.2. 運用德爾菲方法篩選關鍵風險因素 81
4.2.1. 專家背景 81
4.2.2. 第一回合德爾菲 81
4.2.3. 第二回合德爾菲 86
4.2.4. 德爾菲問卷的結果分析 89
4.3. 建構偵查風險的評估機制 92
4.4. 本章小結 94
第五章 偵查風險評估機制個案實證 95
5.1. 製鎖產業概況 95
5.2. 個案公司背景資料 96
5.2.1. 個案公司簡介 96
5.2.2. 個案公司的組織圖 99
5.2.3. 個案公司營運概況 99
5.2.4. 個案公司未來展望 102
5.2.5. 個案公司的簽證會計師事務所 103
5.3. 個案驗證進行程序 104
5.3.1. 個案背景資料取得 104
5.3.2. 評估機制實證之前置作業 105
5.3.3. 評估機制於個案公司之運作 106
5.3.4. 個案驗證結果 108
5.3.5. 個案驗證的品質確認 115
5.4. 評估機制應用實務界的方法 115
第六章 結論 116
6.1. 研究結果 116
6.2. 研究目的之達成 118
6.3. 研究貢獻 119
6.4. 未來研究的建議 120
參考文獻 121
中文文獻 121
英文文獻 122
附錄一:開放性譯碼之編碼過程(概念化結果) 127
附錄二:第一回合德爾菲問卷 138
附錄三:第二回合德爾菲問卷 146
附錄四:獨立樣本T檢定 155
附錄五:取得個案公司資料的種類 160
附錄六:個案公司偵查風險的評估問卷 161
附錄七:填答者的填答資料 167
附錄八:偵查風險評估系統之說明手冊 172
中文文獻
王文俊編著,1997,認識Fuzzy,全華出版,台北。
王敏順,1995,紮根理論研究法之評述,規劃學報,第22期,27-43。
朱柔若譯,W. L. Neuman著,2000,社會研究方法-質化與量化取向,揚智文化事業,台北市。
江仁宏,2000,應用模糊理論於軟體品質評估之研究,國防管理學院,國防資訊研究所碩士論文。
李宗黎和林蕙真,2003,審計新論,証業出版股份有限公司,台北市。
吳芝儀和廖梅花譯,A. Strauss & J. Corbin著,2001,紮根理論研究方法,濤石文化,嘉義市。
吳琮璠,1998,審計學─新觀念與本土化,智勝文化事業有限公司,台北市。
卓雅文,2000,半導體產業環境與安全衛生績效指標之研究,雲林科技大學,環境與安全工程系碩士論文。
洪培秦,2005,建構企業資源規劃系統生命週期管理模型,國立中正大學,會計學研究所碩士論文。
徐宗國譯,A. Strauss & J. Corbin著,1997,質性研究概論,巨流圖書公司,台北市。
戚務君、型x昭、林維珩、姜家訓編譯,Arens Alvin A. & Leobbecke James K.著,2002,審計學,華泰文化事業股份有限公司,台北市。
張維婷,2005,建立中小企業資訊系統委外廠商選擇評估模式,國立中正大學,會計學研究所碩士論文。
陳省三,2002,國際市場進入模式評估程序之研究-以機車產業為例,國立高雄第一科技大學,行銷與流通管理所碩士論文。
頃z卿,2000,整合性物流設施系統方案評估架構之建立,高雄第一科技大學,運輸與倉儲營運系碩士論文。
陳向明,2002,社會科學質的研究,五南圖書,台北市。
陳信安,2003,教學空間實質形式與使用行為間互動模式之研究--以台灣九二一災後重建國民中小學校園為例,彰化師範大學,工業教育學系博士論文。
陳海燕和張慶旭,1998,風險基礎審計量化研究,技術經濟,P.49-51。
楊其清,2001,組織內部知識移轉流程之研究─以惠普科技顧問事業群為例,國立台灣師範大學,工業科技教育研究所碩士論文。
程文郁,2002,以質性研究方法探討消費者選擇行動電話服務業者之行為,國立中山大學,企業管理學系研究所碩士論文。
游勝宇,2005,以平衡計分卡建構ERP系統導入效益評估模式,國立中正大學,會計學研究所碩士論文。
萬家慶,2003,模糊多評準決策應用於研發聯盟發展策略評估之研究–以我國中小企業為例,中原大學,企業管理研究所碩士論文。
楊欣樺,2002,我國運動經紀人角色弁鄐妞膍s,國立臺灣師範大學,運動休閒與管理研究所碩士論文。
蔡佳瑜,2002,企業風險決定因素之探討,淡江大學,會計學研究所碩士論文。
蔡海璋,2003,以模糊理論建構國軍指參深造教育學習評量模式之研究,元智大學,工業工程與管理學系碩士論文。
劉萬正,2001,以DELPHI法探討合理工期之研究─以大型鐵路工程為例,國立交通大學,交通運輸研究所碩士論文。
審計準則公報第一號一般公認審計準則總綱,1970年發布,1983年第一次修訂,1985年第二次修訂,1997年第三次修訂,1990年第四次修訂。
審計準則第四號公報查核之證據,1984年發布。
審計準則公報第十號查核工作之規劃,1986年發布。
審計準則公報第十二號分析性複核,1987年發布。
審計準則公報第十四號舞弊與錯誤,1987年發布。
審計準則公報第二十四號重大性與查核風險,1993年發布。
審計準則公報第三十二號內部控制之考量,1998年發布。
審計準則公報第三十三號財務報表查核報告,1999年發布。
審計準則公報第三十七號對受查者事業之瞭解,2001年發布。


英文文獻
Akresh A.D., Loebbecke J.K., Scotte W.R., Audit approaches and techniques, In Research Opportunities in Auditing: The Second Decade, (1988), edited by A.R. Abdel-Khalik, I. Solomon, Sarasota, FL: American Accounting Association.
Arens A.A., Elder R.J., Beaslsy M.S., Auditing and Assurance Services: An Integrated Approach, 10th ed., (2005), Upper Saddle River, New Jersey: Prentice Hall.
American Institute of Certified Public Accountants (AICPA): SAS 47(1983) and AU 312 (1984), Audit Risk and Materiality in Conducting an Audit.
American Institute of Certified Public Accountants (AICPA): AU 319(1990), Consideration of Internal Control in a Financial Statement Audit.
American Institute of Certified Public Accountants (AICPA): SAS 82(1992) and AU 312 (1984), Consideration of Fraud in a Financial Statement Audit.
Beattie V., Fearnley S., (2002), Brandt R., Auditor independence and audit risk in the UK: a reconceptualisation, Presented at the American Accounting Association Professionlism and Ethics Symposiun, August.
Beaulieu P.R., The effects of judgments of new clients’ integrity upon risk judgments, audit evidence, and fees, Auditing, 20(2), (2001), 85-99.
Bedard J.C., Graham L.E., The effects of decision aid orientation on risk factor identification and audit test planning, Auditing, 21(2), (2002), 39-56.
Behn B.K., Kaplan S.E., Krumwiede K.R., Further evidence on the auditor’s going-concern report: the influence of management plans, Auditing, 20(1), (2001), 13-28.
Bellman R.E., Zadeh L.A., Decision Making in a Fuzzy Environment, Management Science, 17(4), (1970), 141-146.
Bojadziev G., Bojadziev M., (1997), Fuzzy Logic for Business, Finance, and Management, World Scientific, Singapore.
Boynton A.D., Zmud R.W., (1984), An assessment of critical success factors, 25(4), Sloan Management Review, 17-27.
Brooks K.W., Delphi technique: Expand applications, North Central Association Quarterly, 53(3), (1979), 377-385.
Buckley J.W., Buckley M.H., Chiang H.F., Research methodology and business decision, (1976), The Society of Management Accountants of Canada.
Chen S.J., Hwang C.L., (1992), Fuzzy multiple attribute decision making. Springer-Verlag, New York.
Chenitz W.C., Swanson J.M., (1986), From Practice to Grounded Theory: Qualitative Research in Nursing. Addison-Wesley, California.
Chocholik J., Bouchard S., Tan J., Ostrow D., The determination of relevant goals and criteria used to select an automated patient care information system: a Delphi approach, Journal of the American Informatics Association, 6(3), (1999), 219-233.
Church B.K., McMillan J.J., Schneider A., Factors affecting internal auditors’ consideration of fraudulent financial reporting during analytical procedures, Auditing, 20(1), (2001), 65-80.
Committee of Sponsoring Organizations of the Treadway Commission (COSO), (1996), Internal Control Issues in Derivatives Usage, AICPA.
Colbert J.L., Inherent risk: An investigation of auditors’ judgments, Accounting, Organizations and Society, 13(2), (1988), 111-121.
Creswell J.W., Brown M.L., How chairpersons enhance faculty research: a grounded theory study, The Review of Higher Education, 16(1), (1992), 41-62.
Creswell J.W., (1998), Qualitative Inquiry & Research Design, Thousand Oaks, CA: Sage.
Crook C.W., Kumar R.L., Electronic data interchange: a multi-industry investigation using grounded theory, Information & Management, 34(2), (1998), 75-89.
Cushing B.E., Loebbecke J.K., Analytical approaches to audit risk: A survey and analysis, Auditing: A Journal of Practice & Theory, 3, (1983), 23-41.
Cushing B.E., Graham L.E. Jr., Palmrose Z-V., Roussey R.S., Solomon I., (1995), Risk orientation. In Auditing Practice, Research, and Education: A Productive Collaboration, edited by T. B. Bell, A. M. Wright, 11-54, New York, NY: AICPA.
Dalkey N., Helmer O., Delphi Technique: characteristics and sequence model to the use of experts, Management Science, 9(3), (1963), 458-467.
Davutyan N., Kavut L., An application of data envelopment analysis to the evaluation of audit risk: a reinterpretation, ABACUS, 41(3), (2005), 209-306.
Delbecq A.L., Van de Ven A.H., Gustafson D.H., (1975), Group Techniques for Program Planning: A Guide to Nominal and Delphi Processes, Scott, Foresman and Co., IL.
Dilla W.N., Stome D.N., Representations as decision aids: the asymmetric effects of words and numbers on auditors’ inherent risk judgments, Decision Sciences, 28(3), (1997), 709-743.
Dubois D., Prade H., (1980a), Fuzzy Sets and Systems, Academic Press ,New York; (1980b) Theory and Application, Fuzzy Sets and Systems, Academic Press Inc., New York.
Dutta Saurav K., Harrison K.E., Srivastava R.P., The audit risk model under the risk fraud, Applications of Fuzzy Sets & The Theory of Evidence to Accounting II, 14, (1998), 221-244.
Dusenbury R., Reimers J., Wheeler S., The audit risk model at the planning stage: A empirical test for conditional dependencies among assessed component risks, Auditing: A Journal of Practice & Theory, 19, (2000),105-117.
Eisenhardt K.M., Building theories from case study research, Academy of Management Review, 14(4), (1989), 532-550.
Friedlob G.T., Schleifer L.L.F., Fuzzy logic: application for audit risk and uncertainty, Managerial Auditing Journal, 14(3), (1999), 12-13.
Glaser B., Strauss A., (1967), The discovery of grounded theory, Chicago: Aldine.
Glaser B., (1978), Theoretical Sensitivity: Advances in the Methodology of Grounded Theory. Sociology Press, California.
Green B., Jones M., Hughes D., Williams A., Applying the Delphi technique in a study of GPs information requirement. Health and Social Care in the Community, 7(3), (1999), 198-205.
Hammersley M., (1989), The Dilemma of Qualitative Method: Herbert Blumer and the Chicago Tradition, London and New York: Routledge.
Hanafin Sinead, (2004), Review of Literature on the Delphi Technique, [online] availabl
http://www.nco.ie/upload_documents/Delphi_Technique_A_Literature_Review.pdf
Haskins E.H., Dirsmith M.W., Control and inherent risk assessments in client engagements: an examination of their interdependencies, Journal of Accounting and Public Policy, 14, (1993), 63-83.
Hasson Felicity, Keeney Sinead, McKeena Hugh P., Research guideline for the Delphi survey technique, Journal of Advanced Nursing, 32(4), (2000), 1008-1015.
Helliar C., Lyon B., Monroe G.S., Ng J., Woodliff D.R., UK auditors’ perceptions of inherent risk, British Accounting Review, 28(1), (1996), 45-72.
Herriott R.E., Firestine W.A., Multisite qualitative policy research: optimizing description and generalizability, Educational Researcher, 12, (1983), 14-19.
Hevner A.R., March S.T., Jinsoo Park, Sudha Ram, Design Science in Information Systems Research, MIS Quarterly, Mar., 28(1), (2004), 75-106.
Holden M.C., Wedman J.F., Future issues of computer-mediated communication: the results of a Delphi study, Educational Technology, Research and Development, 41(4), (1993), 5-24.
Johnstone K.M., Client-acceptance decisions: simultaneous effects of client business risk, audit risk, auditor business risk, and risk adaptation, Auditing, 19(1), (2000), 1-25.
Kaufmann A., Gupta M.M., (1991), Introduction to Fuzzy Arithmetic Theory and Applications, Van Nostrand Reinhold, New York.
Keeney Sinead, Hasson Felicity, McKeena Hugh P., A critical review of the Delphi technique as a research methodology for nursing, International Journal of Nursing Studies, 38, (2001), 195-200.
Khurana I.K., Raman K.K, Litigation risk and the financial reporting credibility of big 4 versus non-big 4 audits: evidence from Anglo-American countries, The Accounting Review, 79(2), (2004), 473-495.
Kinney W.R. Jr., A mote on compounding probabilities in auditing, Auditing: A Journal of Practice & Theory, 8, (1983),13-22.
Krishnan Jagan, Krishnan Jayanthi, Litigation risk and auditor resignations, The Accounting Review, 72(4), (1997), 539-560.
Laarhoven P.J.M., and Pedrycz W., A Fuzzy Extension of Satty’s Priority Theory, Fuzzy Set and Systems, 11(2), 1983, 229-241.
Lee D.H., Park D., An efficient algorithm for fuzzy weighted average, Fuzzy Sets and Systems, 87, (1997), 39-45.
Linstone H.A., Turoff M., (1975), The Delphi Method: Techniques and Applications, Addison-Wesley Pub, Massachusetts.
Low K.Y., The effects of industry specialization on audit risk assessments and audit-planning decisions, The Accounting Review, 79(1), (2004), 201-219.
Lyon J.D., Maher M.W., The importance of business risk in setting audit fees: evidence from cases of client misconduct, Journal of Accounting Research, 43(1), (2005), 133-151.
Malhotra M.K., Stelle D.C., Grover V., Important strategic and tactical manufacturing issues in the 1990s, Decision Sciences, 25(2), (1994), 189-214.
Martinov N., Roebuck P., The assessment and integration of materiality and inherent risk: an analysis of major firms’ audit practices, International Journal of Auditing, 2, (1998), 103-126.
McKenna H.P., The Delphi technique: a worthwhile approach for nursing?, Journal of Advanced Nursing, 19, (1994), 1221-1225.
Messier W.F. Jr., Austen L.A., Inherent risk and control risk assessments: Evidence on the effect of pervasive and specific risk factors, Auditing: A Journal of Practice & Theory, 19(2), (2000), 119-131.
Mock T.J., Wright A., Srivastava R.P., (1998), Audit Program Planning Using a Belief Function Framework. University of Kansas Audit Research Symposium.
Morse J.M., Field P.A., (1996), Nursing Research: The Application of Qualitative Approaches, 2nd edt., Chapman & Hall, London.
Murry J.W., Hammons J.O., Delphi: A versatile methodology for conducting qualitative research, The Review of Higher Education, 18(4), (1995), 423-436.
Newnam D.P., Paterson E., Smith R., The influence of potentially fraudulent reports on audit risk assessment and planning, The Accounting Review, 76(1), 2001, 59-80.
Ngai E.W.T., Wat F.K.T., Fuzzy decision support system for risk analysis in e-commerce development, Decision Support System, 40, (2005), 235-255.
Novak J.D., Gowin D. B., Construction Vee maps for clinical interviews on molecule concepts, Science Education, 68, (1984.), 441.
Olson M.H., Remote office work: changing work patterns in space and time, Communications of the ACM, 26(3), (1983), 182-187.
Preble J., Public sector use of the Delphi technique, Technological Forecasting and Social Change, 23, (1983), 75-88.
Public Oversight Board(POB), (2000), Panel on Audit Effectiveness Report and Recommendations, August, Stamford, CT:POB.
Randall R.C., Vrijhoef M.M.A., N.H.F. Wilson, Current trends in restorative dentistry in the UK: a Delphi approach, Journal of Dentistry, 30, (2002), 177-187.
Ross T.J., Sorensen H.C., Savage S.J., Carson J.M., DAPS: expert system for structural damage assessment, Journal of Computing in Civil Engineering, 4(4), (1990),327-348.
Rowe Gene, Wright George, The Delphi technique as a forecasting tool: issues and analysis, International Journal of Forecasting, 15, (1999), 353-375.
Schmidt R.C., Managing Delphi surveys using nonparametric statistical techniques, Decision Sciences, 28, (1997), 763-774.
Schmucker K.J., (1984), Fuzzy Sets, Natural Language Computations and Risk Analysis, Computer Science Press, Rockville, MD.
Shailer G., Wade M., Willett R., Yap K.L., Inherent risk and indicative factors: senior auditors’ perceptions, Managerial Auditing Journal, 13(8), (1998), 455-464.
Shieh W.L., (1990), Using the Delphi technique to determine the most important characteristics of effective teaching in Taiwan, A doctor dissertation, University of CinCinnati.
Spizziri, Martha, (2000), “E-surveys: Consider this before you start. The Internet provides a cheap, fast means of doing reader surveys—but you have to know how to do it right.” [online] available: http://www.asbpe.org/archives/2000/07esurveys.htm
Strauss A., Corbin J., (1987), Qualitative analysis for social scientists. Cambridge: Cambridge University Press.
Strauss A., Corbin J., (1990), Basics of Qualitative Research-Grounded Theory Procedures and Techniques, Sage Publications.
Spires E.E., Yardley J.A., (1998), Additional evidence on auditors’ risk assessments, Working-paper, The Ohio State University.
Taylor M.H., The effects of industry specialization on auditors’ inherent risk assessments and confidence judgments, Contemporary Accounting Research, 17(4), (2000), 693-712.
Turner J.L., Involvement or over-involvement? Using grounded theory to explore the complexities of nurse-patient relationships, European Journal of Oncology Nursing, 3(3), (1999), 153-160.
Turner J.L., Mock T.J., Srivastava R.P., (2002a), A Conceptual Framework and Case Studies on Audit Planning and Evaluation Given the Potential for Fraud, Proceeding s of the 2002 Deloitte & Touche University of Kansas Symposium on Auditing Problems. Forthcoming; (2002b), An analysis of the Fraud Triangle, Working Paper. The University of Memphis.
Van Horn R.L., (1973), Empirical studies on M.I.S., Wharton Conference on Research on Computers in Organization, October.
van Zolingen Simone J., Klassen Cees A., Selection processes in a Delphi study about key qualification in Senior Secondary Vocational Education, Technological Forecasting & Social Change, 70, (2003),317-340.
Waller W.S., Auditors’ assessments of inherent and control risk in field settings, The Accounting Review, 68, (1993), 783-802.
Waring A., Glendon A.I., (1998), Managing Risk, International Thomson Business Press, London.
Wei Chun-Chin, Wang Mao-Jiun J., A comprehensive framework for selecting an ERP system, International Journal of Project Management, 22, (2004), 161-169.
Wustemann J., Evaluation and response to risk in international accounting and audit systems: Framework and German experiences, Journal of Corporation Law, 29(2), (2004), 449-466.
Yin, R. K., (1989), Case Study Research: Design and Methods, London: Sage Pub.
Yin, R. K., (1994), Case study research: design and methods, London: Sage Pub.
Zadeh L.A., Fuzzy Set, Information and Control, 8(3), (1965), 338-353.
Zadeh L.A., The Concept of a Lingustic Variable and its Application to Approximate Reasoning, Information Science, 8(1), (1975), 199-249; 8(2), (1975), 301-357; 9(3), (1975),43-80.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top