中文文獻
王文俊編著,1997,認識Fuzzy,全華出版,台北。
王敏順,1995,紮根理論研究法之評述,規劃學報,第22期,27-43。朱柔若譯,W. L. Neuman著,2000,社會研究方法-質化與量化取向,揚智文化事業,台北市。
江仁宏,2000,應用模糊理論於軟體品質評估之研究,國防管理學院,國防資訊研究所碩士論文。李宗黎和林蕙真,2003,審計新論,証業出版股份有限公司,台北市。
吳芝儀和廖梅花譯,A. Strauss & J. Corbin著,2001,紮根理論研究方法,濤石文化,嘉義市。
吳琮璠,1998,審計學─新觀念與本土化,智勝文化事業有限公司,台北市。
卓雅文,2000,半導體產業環境與安全衛生績效指標之研究,雲林科技大學,環境與安全工程系碩士論文。洪培秦,2005,建構企業資源規劃系統生命週期管理模型,國立中正大學,會計學研究所碩士論文。徐宗國譯,A. Strauss & J. Corbin著,1997,質性研究概論,巨流圖書公司,台北市。
戚務君、型x昭、林維珩、姜家訓編譯,Arens Alvin A. & Leobbecke James K.著,2002,審計學,華泰文化事業股份有限公司,台北市。
張維婷,2005,建立中小企業資訊系統委外廠商選擇評估模式,國立中正大學,會計學研究所碩士論文。陳省三,2002,國際市場進入模式評估程序之研究-以機車產業為例,國立高雄第一科技大學,行銷與流通管理所碩士論文。頃z卿,2000,整合性物流設施系統方案評估架構之建立,高雄第一科技大學,運輸與倉儲營運系碩士論文。
陳向明,2002,社會科學質的研究,五南圖書,台北市。
陳信安,2003,教學空間實質形式與使用行為間互動模式之研究--以台灣九二一災後重建國民中小學校園為例,彰化師範大學,工業教育學系博士論文。陳海燕和張慶旭,1998,風險基礎審計量化研究,技術經濟,P.49-51。
楊其清,2001,組織內部知識移轉流程之研究─以惠普科技顧問事業群為例,國立台灣師範大學,工業科技教育研究所碩士論文。程文郁,2002,以質性研究方法探討消費者選擇行動電話服務業者之行為,國立中山大學,企業管理學系研究所碩士論文。游勝宇,2005,以平衡計分卡建構ERP系統導入效益評估模式,國立中正大學,會計學研究所碩士論文。萬家慶,2003,模糊多評準決策應用於研發聯盟發展策略評估之研究–以我國中小企業為例,中原大學,企業管理研究所碩士論文。楊欣樺,2002,我國運動經紀人角色弁鄐妞膍s,國立臺灣師範大學,運動休閒與管理研究所碩士論文。蔡佳瑜,2002,企業風險決定因素之探討,淡江大學,會計學研究所碩士論文。蔡海璋,2003,以模糊理論建構國軍指參深造教育學習評量模式之研究,元智大學,工業工程與管理學系碩士論文。劉萬正,2001,以DELPHI法探討合理工期之研究─以大型鐵路工程為例,國立交通大學,交通運輸研究所碩士論文。審計準則公報第一號一般公認審計準則總綱,1970年發布,1983年第一次修訂,1985年第二次修訂,1997年第三次修訂,1990年第四次修訂。
審計準則第四號公報查核之證據,1984年發布。
審計準則公報第十號查核工作之規劃,1986年發布。
審計準則公報第十二號分析性複核,1987年發布。
審計準則公報第十四號舞弊與錯誤,1987年發布。
審計準則公報第二十四號重大性與查核風險,1993年發布。
審計準則公報第三十二號內部控制之考量,1998年發布。
審計準則公報第三十三號財務報表查核報告,1999年發布。
審計準則公報第三十七號對受查者事業之瞭解,2001年發布。
英文文獻
Akresh A.D., Loebbecke J.K., Scotte W.R., Audit approaches and techniques, In Research Opportunities in Auditing: The Second Decade, (1988), edited by A.R. Abdel-Khalik, I. Solomon, Sarasota, FL: American Accounting Association.
Arens A.A., Elder R.J., Beaslsy M.S., Auditing and Assurance Services: An Integrated Approach, 10th ed., (2005), Upper Saddle River, New Jersey: Prentice Hall.
American Institute of Certified Public Accountants (AICPA): SAS 47(1983) and AU 312 (1984), Audit Risk and Materiality in Conducting an Audit.
American Institute of Certified Public Accountants (AICPA): AU 319(1990), Consideration of Internal Control in a Financial Statement Audit.
American Institute of Certified Public Accountants (AICPA): SAS 82(1992) and AU 312 (1984), Consideration of Fraud in a Financial Statement Audit.
Beattie V., Fearnley S., (2002), Brandt R., Auditor independence and audit risk in the UK: a reconceptualisation, Presented at the American Accounting Association Professionlism and Ethics Symposiun, August.
Beaulieu P.R., The effects of judgments of new clients’ integrity upon risk judgments, audit evidence, and fees, Auditing, 20(2), (2001), 85-99.
Bedard J.C., Graham L.E., The effects of decision aid orientation on risk factor identification and audit test planning, Auditing, 21(2), (2002), 39-56.
Behn B.K., Kaplan S.E., Krumwiede K.R., Further evidence on the auditor’s going-concern report: the influence of management plans, Auditing, 20(1), (2001), 13-28.
Bellman R.E., Zadeh L.A., Decision Making in a Fuzzy Environment, Management Science, 17(4), (1970), 141-146.
Bojadziev G., Bojadziev M., (1997), Fuzzy Logic for Business, Finance, and Management, World Scientific, Singapore.
Boynton A.D., Zmud R.W., (1984), An assessment of critical success factors, 25(4), Sloan Management Review, 17-27.
Brooks K.W., Delphi technique: Expand applications, North Central Association Quarterly, 53(3), (1979), 377-385.
Buckley J.W., Buckley M.H., Chiang H.F., Research methodology and business decision, (1976), The Society of Management Accountants of Canada.
Chen S.J., Hwang C.L., (1992), Fuzzy multiple attribute decision making. Springer-Verlag, New York.
Chenitz W.C., Swanson J.M., (1986), From Practice to Grounded Theory: Qualitative Research in Nursing. Addison-Wesley, California.
Chocholik J., Bouchard S., Tan J., Ostrow D., The determination of relevant goals and criteria used to select an automated patient care information system: a Delphi approach, Journal of the American Informatics Association, 6(3), (1999), 219-233.
Church B.K., McMillan J.J., Schneider A., Factors affecting internal auditors’ consideration of fraudulent financial reporting during analytical procedures, Auditing, 20(1), (2001), 65-80.
Committee of Sponsoring Organizations of the Treadway Commission (COSO), (1996), Internal Control Issues in Derivatives Usage, AICPA.
Colbert J.L., Inherent risk: An investigation of auditors’ judgments, Accounting, Organizations and Society, 13(2), (1988), 111-121.
Creswell J.W., Brown M.L., How chairpersons enhance faculty research: a grounded theory study, The Review of Higher Education, 16(1), (1992), 41-62.
Creswell J.W., (1998), Qualitative Inquiry & Research Design, Thousand Oaks, CA: Sage.
Crook C.W., Kumar R.L., Electronic data interchange: a multi-industry investigation using grounded theory, Information & Management, 34(2), (1998), 75-89.
Cushing B.E., Loebbecke J.K., Analytical approaches to audit risk: A survey and analysis, Auditing: A Journal of Practice & Theory, 3, (1983), 23-41.
Cushing B.E., Graham L.E. Jr., Palmrose Z-V., Roussey R.S., Solomon I., (1995), Risk orientation. In Auditing Practice, Research, and Education: A Productive Collaboration, edited by T. B. Bell, A. M. Wright, 11-54, New York, NY: AICPA.
Dalkey N., Helmer O., Delphi Technique: characteristics and sequence model to the use of experts, Management Science, 9(3), (1963), 458-467.
Davutyan N., Kavut L., An application of data envelopment analysis to the evaluation of audit risk: a reinterpretation, ABACUS, 41(3), (2005), 209-306.
Delbecq A.L., Van de Ven A.H., Gustafson D.H., (1975), Group Techniques for Program Planning: A Guide to Nominal and Delphi Processes, Scott, Foresman and Co., IL.
Dilla W.N., Stome D.N., Representations as decision aids: the asymmetric effects of words and numbers on auditors’ inherent risk judgments, Decision Sciences, 28(3), (1997), 709-743.
Dubois D., Prade H., (1980a), Fuzzy Sets and Systems, Academic Press ,New York; (1980b) Theory and Application, Fuzzy Sets and Systems, Academic Press Inc., New York.
Dutta Saurav K., Harrison K.E., Srivastava R.P., The audit risk model under the risk fraud, Applications of Fuzzy Sets & The Theory of Evidence to Accounting II, 14, (1998), 221-244.
Dusenbury R., Reimers J., Wheeler S., The audit risk model at the planning stage: A empirical test for conditional dependencies among assessed component risks, Auditing: A Journal of Practice & Theory, 19, (2000),105-117.
Eisenhardt K.M., Building theories from case study research, Academy of Management Review, 14(4), (1989), 532-550.
Friedlob G.T., Schleifer L.L.F., Fuzzy logic: application for audit risk and uncertainty, Managerial Auditing Journal, 14(3), (1999), 12-13.
Glaser B., Strauss A., (1967), The discovery of grounded theory, Chicago: Aldine.
Glaser B., (1978), Theoretical Sensitivity: Advances in the Methodology of Grounded Theory. Sociology Press, California.
Green B., Jones M., Hughes D., Williams A., Applying the Delphi technique in a study of GPs information requirement. Health and Social Care in the Community, 7(3), (1999), 198-205.
Hammersley M., (1989), The Dilemma of Qualitative Method: Herbert Blumer and the Chicago Tradition, London and New York: Routledge.
Hanafin Sinead, (2004), Review of Literature on the Delphi Technique, [online] availabl
http://www.nco.ie/upload_documents/Delphi_Technique_A_Literature_Review.pdf
Haskins E.H., Dirsmith M.W., Control and inherent risk assessments in client engagements: an examination of their interdependencies, Journal of Accounting and Public Policy, 14, (1993), 63-83.
Hasson Felicity, Keeney Sinead, McKeena Hugh P., Research guideline for the Delphi survey technique, Journal of Advanced Nursing, 32(4), (2000), 1008-1015.
Helliar C., Lyon B., Monroe G.S., Ng J., Woodliff D.R., UK auditors’ perceptions of inherent risk, British Accounting Review, 28(1), (1996), 45-72.
Herriott R.E., Firestine W.A., Multisite qualitative policy research: optimizing description and generalizability, Educational Researcher, 12, (1983), 14-19.
Hevner A.R., March S.T., Jinsoo Park, Sudha Ram, Design Science in Information Systems Research, MIS Quarterly, Mar., 28(1), (2004), 75-106.
Holden M.C., Wedman J.F., Future issues of computer-mediated communication: the results of a Delphi study, Educational Technology, Research and Development, 41(4), (1993), 5-24.
Johnstone K.M., Client-acceptance decisions: simultaneous effects of client business risk, audit risk, auditor business risk, and risk adaptation, Auditing, 19(1), (2000), 1-25.
Kaufmann A., Gupta M.M., (1991), Introduction to Fuzzy Arithmetic Theory and Applications, Van Nostrand Reinhold, New York.
Keeney Sinead, Hasson Felicity, McKeena Hugh P., A critical review of the Delphi technique as a research methodology for nursing, International Journal of Nursing Studies, 38, (2001), 195-200.
Khurana I.K., Raman K.K, Litigation risk and the financial reporting credibility of big 4 versus non-big 4 audits: evidence from Anglo-American countries, The Accounting Review, 79(2), (2004), 473-495.
Kinney W.R. Jr., A mote on compounding probabilities in auditing, Auditing: A Journal of Practice & Theory, 8, (1983),13-22.
Krishnan Jagan, Krishnan Jayanthi, Litigation risk and auditor resignations, The Accounting Review, 72(4), (1997), 539-560.
Laarhoven P.J.M., and Pedrycz W., A Fuzzy Extension of Satty’s Priority Theory, Fuzzy Set and Systems, 11(2), 1983, 229-241.
Lee D.H., Park D., An efficient algorithm for fuzzy weighted average, Fuzzy Sets and Systems, 87, (1997), 39-45.
Linstone H.A., Turoff M., (1975), The Delphi Method: Techniques and Applications, Addison-Wesley Pub, Massachusetts.
Low K.Y., The effects of industry specialization on audit risk assessments and audit-planning decisions, The Accounting Review, 79(1), (2004), 201-219.
Lyon J.D., Maher M.W., The importance of business risk in setting audit fees: evidence from cases of client misconduct, Journal of Accounting Research, 43(1), (2005), 133-151.
Malhotra M.K., Stelle D.C., Grover V., Important strategic and tactical manufacturing issues in the 1990s, Decision Sciences, 25(2), (1994), 189-214.
Martinov N., Roebuck P., The assessment and integration of materiality and inherent risk: an analysis of major firms’ audit practices, International Journal of Auditing, 2, (1998), 103-126.
McKenna H.P., The Delphi technique: a worthwhile approach for nursing?, Journal of Advanced Nursing, 19, (1994), 1221-1225.
Messier W.F. Jr., Austen L.A., Inherent risk and control risk assessments: Evidence on the effect of pervasive and specific risk factors, Auditing: A Journal of Practice & Theory, 19(2), (2000), 119-131.
Mock T.J., Wright A., Srivastava R.P., (1998), Audit Program Planning Using a Belief Function Framework. University of Kansas Audit Research Symposium.
Morse J.M., Field P.A., (1996), Nursing Research: The Application of Qualitative Approaches, 2nd edt., Chapman & Hall, London.
Murry J.W., Hammons J.O., Delphi: A versatile methodology for conducting qualitative research, The Review of Higher Education, 18(4), (1995), 423-436.
Newnam D.P., Paterson E., Smith R., The influence of potentially fraudulent reports on audit risk assessment and planning, The Accounting Review, 76(1), 2001, 59-80.
Ngai E.W.T., Wat F.K.T., Fuzzy decision support system for risk analysis in e-commerce development, Decision Support System, 40, (2005), 235-255.
Novak J.D., Gowin D. B., Construction Vee maps for clinical interviews on molecule concepts, Science Education, 68, (1984.), 441.
Olson M.H., Remote office work: changing work patterns in space and time, Communications of the ACM, 26(3), (1983), 182-187.
Preble J., Public sector use of the Delphi technique, Technological Forecasting and Social Change, 23, (1983), 75-88.
Public Oversight Board(POB), (2000), Panel on Audit Effectiveness Report and Recommendations, August, Stamford, CT:POB.
Randall R.C., Vrijhoef M.M.A., N.H.F. Wilson, Current trends in restorative dentistry in the UK: a Delphi approach, Journal of Dentistry, 30, (2002), 177-187.
Ross T.J., Sorensen H.C., Savage S.J., Carson J.M., DAPS: expert system for structural damage assessment, Journal of Computing in Civil Engineering, 4(4), (1990),327-348.
Rowe Gene, Wright George, The Delphi technique as a forecasting tool: issues and analysis, International Journal of Forecasting, 15, (1999), 353-375.
Schmidt R.C., Managing Delphi surveys using nonparametric statistical techniques, Decision Sciences, 28, (1997), 763-774.
Schmucker K.J., (1984), Fuzzy Sets, Natural Language Computations and Risk Analysis, Computer Science Press, Rockville, MD.
Shailer G., Wade M., Willett R., Yap K.L., Inherent risk and indicative factors: senior auditors’ perceptions, Managerial Auditing Journal, 13(8), (1998), 455-464.
Shieh W.L., (1990), Using the Delphi technique to determine the most important characteristics of effective teaching in Taiwan, A doctor dissertation, University of CinCinnati.
Spizziri, Martha, (2000), “E-surveys: Consider this before you start. The Internet provides a cheap, fast means of doing reader surveys—but you have to know how to do it right.” [online] available: http://www.asbpe.org/archives/2000/07esurveys.htm
Strauss A., Corbin J., (1987), Qualitative analysis for social scientists. Cambridge: Cambridge University Press.
Strauss A., Corbin J., (1990), Basics of Qualitative Research-Grounded Theory Procedures and Techniques, Sage Publications.
Spires E.E., Yardley J.A., (1998), Additional evidence on auditors’ risk assessments, Working-paper, The Ohio State University.
Taylor M.H., The effects of industry specialization on auditors’ inherent risk assessments and confidence judgments, Contemporary Accounting Research, 17(4), (2000), 693-712.
Turner J.L., Involvement or over-involvement? Using grounded theory to explore the complexities of nurse-patient relationships, European Journal of Oncology Nursing, 3(3), (1999), 153-160.
Turner J.L., Mock T.J., Srivastava R.P., (2002a), A Conceptual Framework and Case Studies on Audit Planning and Evaluation Given the Potential for Fraud, Proceeding s of the 2002 Deloitte & Touche University of Kansas Symposium on Auditing Problems. Forthcoming; (2002b), An analysis of the Fraud Triangle, Working Paper. The University of Memphis.
Van Horn R.L., (1973), Empirical studies on M.I.S., Wharton Conference on Research on Computers in Organization, October.
van Zolingen Simone J., Klassen Cees A., Selection processes in a Delphi study about key qualification in Senior Secondary Vocational Education, Technological Forecasting & Social Change, 70, (2003),317-340.
Waller W.S., Auditors’ assessments of inherent and control risk in field settings, The Accounting Review, 68, (1993), 783-802.
Waring A., Glendon A.I., (1998), Managing Risk, International Thomson Business Press, London.
Wei Chun-Chin, Wang Mao-Jiun J., A comprehensive framework for selecting an ERP system, International Journal of Project Management, 22, (2004), 161-169.
Wustemann J., Evaluation and response to risk in international accounting and audit systems: Framework and German experiences, Journal of Corporation Law, 29(2), (2004), 449-466.
Yin, R. K., (1989), Case Study Research: Design and Methods, London: Sage Pub.
Yin, R. K., (1994), Case study research: design and methods, London: Sage Pub.
Zadeh L.A., Fuzzy Set, Information and Control, 8(3), (1965), 338-353.
Zadeh L.A., The Concept of a Lingustic Variable and its Application to Approximate Reasoning, Information Science, 8(1), (1975), 199-249; 8(2), (1975), 301-357; 9(3), (1975),43-80.