SlideShare a Scribd company logo
1 of 6
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1146
An Investigation into the Adoption of Computer Assisted Audit
Techniques in the Oil and Gas Industry. A case study of Tullow Ghana
Limited
Alexander Braye1, Mutala Mohammed2, Darryl Mensah3
1Computer Networking Lecturer, Ghana Technology University College (G.T.U.C), Takoradi Campus, Ghana
2Computer Security Lecturer, Ghana Technology University College (G.T.U.C), Takoradi Campus, Ghana
3Information Technology Officer, Tullow Ghana Limited, Takoradi Office, Ghana
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - As technology is being introduced by
organizations in making work efficient and effective, the
security of these technologies is of great importance as data
from these organizations keeps expanding. It is, therefore,
imperative to ensure these technologies are audited to
ensure there are no glitches or vulnerabilities.
The main objective of this study is to examine the
Technology Acceptance Model and the Diffusion of
Innovation Theory in the adoption of computer assisted
audit techniques in the Oil and Gas industry in Ghana. The
data collected from the questionnaire were analyzed using a
mixed methodology that is quantitative and qualitative.
Priority was given to the quantitative methodology in
collecting and analyzing data for the study. A secondary
survey was used to grab evidence for the analysis of the
study. This helped to get opinions, attitudes and description
for the study. Based on the key findings of the research, an
organization in adopting a technology for its systems
auditing is greatly influenced by the behavior of its
employees in accepting technology use as explained by [1] in
his Technology acceptance model.
Key Words: Technology Acceptance Model, Adoption,
CAATs, Oil and Gas
1. INTRODUCTION
Today’s organisations operate in a dynamic global-
market environment with focus on operating in a
collaborative and strict requirement in the
telecommunications network notwithstanding the location
of other branches of their organisation. These
organisations irrespective of their size or scope of business
have come to realise the importance of adopting
technology to compete in the global market. They however,
invest greatly in designing and implementing systems that
are complex and sometimes challenging to manage.
With the advancement of technology, organisations are
becoming more dependent on information systems to do
their businesses. As they adopt these systems in service
delivery, and engage in a paperless system or transaction
these data collected keeps growing by the day. These data
could either be financial or non-financial transactions as
well as network logs. For this data to be effectively
managed, it calls for the need to adopt the Computer
Assisted Audit Tools (CAATs) in analysing data.
The process of auditing information systems is
characterised by adopting tools and techniques in
Computer Information Systems which is mostly referred to
as Computer-Assisted Audit Tools and techniques (CAATs).
CAATs is a means by which organisations adopt the use of
technology for monitoring and compliance auditing [2].
CAATs provide an efficient and effective means for IT
auditors to achieve their audit objective [3].
Computer Assisted Audit Techniques (CAATs)
represents the usage of technology by an auditor to assist
in the completion of an audit process [4][11]. CAATs are
tools and techniques adopted by either internal or external
auditors in the process of auditing an organisation with the
purpose of collecting data from their systems [5].
The availability and usage of data is the most important
aspect of business growth, as a result the confidentiality,
integrity, reliability and availability of data and system
processes are a major concern or influence of IT audit. The
use of Computer-Assisted Audit tools and Techniques
(CAATs) is often associated with data mining which
extracts data for analysis.
Due to the enormous growth of data and transactional
processing in today’s economy, organisations can hardly
function efficiently without the use of technology in their
operations [6]. Information system audit ensures
organisational data is confidentially stored, and data is
always made available for authorised users always [7].
The adoption of CAAT’s does not only apply to its usage
in banks or financial institutions for detecting fraud but
also by oil and gas exploration and production companies,
especially in the deep-water where large amount of data
and information systems is adopted, auditing manually
would be tedious.
Anantha Sayana, in 2003 classified the use of CAATs
into four broad categories;
 Data Analysis Software
 Network Security Evaluation
 Operating Systems (OS) and Database Management
System (DBMS) Security Evaluation Software/Utilities
Software and Code Testing Tools
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1147
This research seeks to explore the motivational factors
in implementing or adopting CAATS in the oil and gas
exploration and production industry in Ghana, using
Tullow Ghana Limited as a case study.
As the oil wells in locations close to the ports and cities,
(otherwise known as On-shore drilling) often dry-up, oil
and gas exploration and production companies like Exxon,
Total, Shell, Chevron and others have resorted to
exploration and drilling in the deep waters offshore. These
industries adapt the use of technologies like video
conferencing and VSAT (Very-Small-Aperture-Terminal) in
their operational mechanism for increasing growth and
productivity in their operations. VSAT systems use
commercial satellite connections as a high-speed digital
link between locations, which are traditionally impossible
to access. VSAT technology is mostly used by banks and oil
companies in their operations because of its success in
supplying connectivity to its remote locations.
2. LITERATURE REVIEW
2.1 Introduction
This chapter highlights various theories in adopting and
accepting technology in auditing information systems by
organizations. There have been many researches done in
the past referring to Computer Assisted Audit Tools
(CAATs). Researchers have also come up with their
findings based on the importance of information systems in
business operations. CAATs is a technique that involves the
use of technology that is computer programs by auditors or
system auditors during the process of audit to enable them
to achieve the general objectives of auditing [8].
Researchers have carried out different studies on the
adoption of technology by organizations and have
examined theories like the diffusion of innovation, theory
of reasoned action, and the theory of behavior to support
their literature [9].
A study by [6] on using CAATs to support information
systems classified CAATs into four categories; namely, Data
Analysis Software, Network Security Evaluation, Operating
System (OS) and Database Management Systems (DBMS)
Security Evaluation Software, and Software and Code
Testing Tools. [10] on referencing other researches in
CAATs usage, stated that CAATs can be used or is mostly
used by banks or financial institutions for investigating
fraud and detecting anomalies in transactions. [4][11]
conducted a survey on governmental auditors regarding
their use of Audit Command Language (ACL) a
commercially available CAAT. Participants perceived the
potential benefits of ACL, but displayed a lower confidence
in their technical abilities to use ACL.
Despite the benefits of the usage of CAATs in the
auditing process and standards, audit technologies in the
audit firms, previous studies show that auditors do not
often use CAATs when auditing [12].
2.2 Theoretical Framework
The academic basis in the adoption of technology is
known as Unified Theory of Acceptance and Use of
Technology (UTAUT). UTAUT is a unified model developed
by [13] who adopted, examined, compared and tested eight
theories of competition in this area of research. Various
researchers in the past have tried to find general factors
that influence users when technology options were
adopted for a variety of realms. These models have been
adopted in Information Technology decisions from a
psychological perspective from which it first originated.
These models include the Technological Adoption Model
(TAM), Innovation Diffusion Theory (IDT), Social Cognitive
Theory (SCT), Theory of Reasoned Action (TRA), Theory of
Planned Behavior (TPB), Motivation Model (MM), the
Model of Personal Computation Utilization (MPCU) and a
combination of Technology Acceptance/Adoption Model
and Theory of Planned Behavior. [13] having reviewed all
eight models, established a theoretical and experimental
similarities across the eight models of the UTAUT.
A recent study also by [14], who adopt four hypothesis
referencing [13] four construct of the UTAUT. In the
hypothesis stated:
a. “H1: Performance Expectancy (PE) positively affects
the behaviour intention in the adoption of CAATS i.e.
performance expectancy would increase when
technology is adopted in auditing”.
b. “H2: Effort Expectancy (EE) positively affects
behavioral intention in the adoption of CAATS i.e. if
technology is easy to be used, then individuals would
be willing to learn and adopt to the new features”.
c. “H3: Social Influence (SI) positively affects behavioral
intention to adopt CAATS”.
d. “H4: Facilitating Conditions (FC) positively affects
behavioral intention to adopt CAATS”
Fig -2.1: UTAUT as proposed by Venkatesh et al (2003)
The figure above shows the conceptual framework as
proposed as “constructs” of the UTAUT by Venkatesh et al
(2003). The four constructs are the Performance
Expectancy, Social Influence, Facilitating Conditions and
Effort Expectancy as illustrated in Fig-2.1 above.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1148
2.3 THEORETICAL REVIEW
2.3.1 TECHNOLOGY ACCEPTANCE MODEL (TAM)
Technology Acceptance Model (TAM) is an information
system theory that demonstrates how users accept and use
a technology [15]. It suggests that when users are
presented with a new technology, many factors influence
their decision about how and when they will use it. TAM as
introduce by [1] stated the influencing factors for accepting
technology as;
1. Perceived usefulness (PU) “the degree to which a
person believes that using a particular system would
enhance his or her job performance”.
2. Perceived Ease-Of-Use (PEOU) “the degree to which a
person believes that using a particular system would be
free from effort”.
Davis, on relying on prior work by [16], who formulated
the theory of Reasoned Action stated a conceptual model to
propose the Technology Acceptance Model (TAM) as
shown in Figure 2.2 below.
Fig -2.2: Original TAM (Davis 1986)
The TAM model as proposed by Davis, shown in Figure
2.2 above with arrows illustrates causal relationships. In
this model, “a potential user’s overall attitude toward using
a given system is hypothesized to be a major determinant
of whether he actually uses it. Attitude towards using, in
turn, is a function of two major beliefs: perceived
usefulness and perceived ease of use. Perceived ease of use
has a causal effect on perceived usefulness. Design features
directly influences perceived usefulness and perceived
ease of use.” Referencing [16] model, the relationship of the
TAM model can be expressed in four equations:
1.
2.
3.
4.
2.3.2 DIFFUSION OF INNOVATION THEORY
The Diffusion of Innovation (DOI) is a theory proposed
by [17], to explain how, and why a technology can be
adopted. Rogers defines diffusion as “the process in which
an innovation is communicated through a certain channel
over a period among the members of a social system”.
According to his theory, the adoption of a new
technology mostly undergoes a process of decision making
amongst individuals or groups. He further explains that an
innovation or technology may already be in existence but
once a group or individual finds it to be new to them, then
it can still be considered as an innovation for that group or
individual. For [17], an organization in making the
decision to adopt an innovation or adopt a new technology
they must undergo a five-step process of making an
innovation-decision; Knowledge, Persuasion, Decision,
Implementation and Confirmation. Once this process is
assumed the organization or individual can finally make
the decision to either implement or reject a technology or
innovation.
Fig -2.3: Five stages in the Decision Innovation Process as
proposed by [17]
3.0 METHODOLOGY
The researchers in getting a better understanding of the
research problems adopted the mixed methodology that is
a combination of the quantitative and qualitative
methodology of collecting and analyzing data for the study
[18]. Priority was however, given to the quantitative
methodology in collecting and analyzing the data. A
secondary survey was used to grab evidence for the
analysis of the study. This helped to get opinions, attitudes
and description for the study. Some of the data collected
were from interviews carried out on phone conversations
and via face to face with selected infrastructure specialists
of the case study company.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1149
Tullow Ghana Limited was selected because it is a
leading independent oil and gas, exploration and
production company in Ghana and also adopts the use of
technology in their day to day operations. A sample size of
50 respondents was selected from Tullow Ghana Limited
for this study.
To ensure validity and reliability of the data collected
for this study, the researchers exercise care to ensure that
the responses are those that have been released by the
respondents of the selected case study company. The data
was collated from questionnaires that were given to
respondents online (using: Google forms) to answer
without any undue influence, link to the questionnaires
were sent to some respondents on WhatsApp platform
whiles some respondents were e-mailed the link to fill out
the questionnaire online.
The data collected was analyzed quantitatively. They
were first edited to ensure consistency, which would then
be coded and analyzed by a combination of descriptive
accounts and summary statistics in terms of frequencies
and percentages.
4. DATA ANALYSIS
4.1 Demographic Background
Table 4.1 below gives the frequency distribution of
respondents (in this case the staff of Tullow Ghana
Limited); 24 of the respondents representing 48% who
were presented with the questionnaire were in the age
range of 31-40 years, 20 (40%) were in the 20-30 age
group and 6 (12%) were in the 41-50 age group. The
distribution shows that 88.0% of workers who answered
the questionnaire were less than 40 years, suggesting a
young workforce that should have a working knowledge of
information technology.
Table -4.1: Age Group of Respondents
Age Distribution of Respondents
Age group Frequency Percent (%)
20-30 20 40.0
31-40 24 48.0
41-50 6 12.0
Total 50 100.0
As indicated in Table 4.2 below, 34 (64%) of the
respondents indicated that there are applications and
processes implemented by the Information Systems
Department in auditing company assets (systems and
phones). Information Systems Assets and Procurement
Administrator stated through an interview to confirm that
when new users join the company they are taken through
the new starter process and once a login credential is
created, a ticket is logged to the Asset team to issue out
assets to the users.
Table -4.2: Are there any tools, applications or processes
in recording assets issued out to staffs?
Availability of Means of Measure Analysis
Response Frequency Percent (%)
Yes 34 68.0
No 10 20.0
Not Applicable 6 12.0
Total 50 100.0
All respondents representing 100% indicated that IT
assets are audited periodically by the organization,
however they could not state the exact period assets are
audited as Table 4.3 depicts. Out of the 50 respondents,
26% responded asset audit was carried out as per the
Auditors discretion, 32% responded quarterly, 30%
responded annually whereas 12% responded audit was
carried out monthly.
Table - 4.3: How often are IT assets audited?
Frequency of Auditing of IT Assets
Response Frequency Percent (%)
Monthly 6 12.0
Annually 15 30.0
Quarterly 16 32.0
As per Auditors
discretion
13 26.0
Total 50 100.0
As illustrated in Table 4.4 below, all respondents
(100%) confirmed the organization uses security tools to
scan all computers on the network, install patches and
uninstall unauthorized applications or browsers by end-
user systems. As confirmed by a Security Analyst in an
interview over the telephone and asked how often this tool
was run on systems he responded, “as and when it’s
needed, and the process is automated”. He also stated that
during the process when patches are running on the
computers users are not given the option to cancel or close
the patch installation and compliance check, but once the
process has successfully been completed the application
closes by itself. There is normally no exemption of user
systems when the process/exercise is running or carried
out.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1150
Table 4.4: Does the company use technology for
compliance checks on systems?
Response to Compliance Check
Response Frequency Percent (%)
Yes 50 100.0
4.2 Attitudes towards the use of CAATs
Exactly 43 (86%) indicated that the company adopt
computer assisted audit tools and techniques in systems
auditing process, 7 (14%) said no, as indicated in Table 4.5
below. Generally, the company adopts computer assisted
audit tools and techniques in systems auditing process.
Table 4.5: Does the company adopt Computer assisted
audit tools and techniques in systems auditing process?
Response to Adoption of CAATs
Response Frequency Percent (%)
Yes 43 86.0
No 7 14.0
Total 50 100.0
When finding out from respondents whether adopting
CAATs in auditing information systems has come to replace
the manual way of auditing the systems, 31(62%) of the
respondents say “Yes”, whereas 19(38%) said it is not the
case as indicated in table 4.6 below.
Table 4.6: Has CAATs in auditing replace the manual way
of auditing?
Response on Manual to CAATs Adoption
Response Frequency Percent (%)
Yes 31 62.0
No 19 38.0
Total 50 100.0
From Table 4.7 below a greater percentage of the
respondents 38 (76%) stated that employees believed that
the introduction of IT has influenced their works by
making it efficient and effective. The remaining 12 (24%)
stated otherwise, by indicating that there is the need to
continual updating themselves in the usage of IT to remain
competitive in their profession.
Table 4.7: What is the attitude of employees towards the
adoption of Computer Assisted Audit Tools and
Techniques?
Response to Attitude of Employees to CAATs
Description Freq.
Percent
(%)
Employees believe that the
introduction of IT has an
influence in making their work
efficient and effective.
38 76.0
Employees believe in continually
updating themselves in the use of
IT to remain competitive in their
profession.
12 24.0
Total 50 100.0
In knowing the opinion of the respondents on the
effects of the adoption of IT tools and techniques in the
company 43 (68%) stated that the introduction of IT serves
as a tool for helping them work effectively, 10 (16%)
indicated that IT tools serves as a tool for work. 6 (10%)
indicated that it was difficult to ignore IT tools when
working, the remaining 4 (6%) stated its introduction
distracts their actual work. All the responses are depicted
in Table 4.8 below.
Table 4.8: What is your opinion about the adoption of IT
tools and techniques in the company? (Multiple responses,
n = 63)
Responses to Opinions of employees on CAATs
Opinion Frequenc
y
Percent
(%)
Its introduction distracts the
actual work
4 6.0
IT serves as a tool that helps
in working
43 68.0
Serves as a tool for work 10 16.0
Difficult to ignore when
working
6 10.0
Total 63 100.0
5.0 CONCLUSION
Based on the key findings of the research an
organization in adopting a technology for its systems
auditing is greatly influenced by the behavior of its
employees in accepting technology use as explained by [1]
in his Technology acceptance model.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1151
Also, the behavior of personnel towards the
introduction of new technologies is very important in an
organization. Whiles some employees embrace new
technologies and avail themselves to expand their
knowledge to learn new technologies others are reluctant
and fear the introduction and acceptance of these
technologies in working.
REFERENCES
[1] F. Davis, "Perceived Usefulness, Perceived Ease of Use,
and User Acceptance of Information Technology," MIS
Quarterly, vol. 13, pp. 319-339, 1989.
[2] Glen C. Mueller, "Using Computer Assisted Audit
Techniques for More Effective Compliance Auditing
and Monitoring in the Healthcare Organisations," pp.
1-3.
[3] S. W. Tommie (Ph.D), "Data Extraction, A Hindrance to
Using CAATs," ISACA Journal, vol. 6, pp. 7-7, 2010.
[4] Braun R. L., & Davis H. E., "Computer-Assisted Audit
Tools and Techniques: Analysis and Perspectives."
Managerial Auditing Journal, vol. 18, no. 9, pp. 725-
731, 2003.
[5] Andreas Kiesow, Michael Fellamann, Novica Zarvic, &
Oliver Thomas, "Managing Internal Control: Designing
a Wiki-Based Information System for Continuous
Process Assurance," Thirty Sixth International
Conference on Information Systems, Fort Worth,
Texas, 2015.
[6] A. S. Sayana, "Using CAATs to Support IS Audit,"
Information Systems Control Journal ISSN: 1526-
7407, vol. 1, pp. 21-23, 2003.
[7] H. Ocharo, “The Importance of Information Systems,
Japan:
https://www.linkedin.com/pulse/20140620054920-
64969119-the-importance-of-information-systems-
audit/, 2014.
[8] V. Kamessam (The Governor), "Information Systems
Auditing Policy for Banking and Financial Sector,"
Working Group, Information Technology Dept.,
Reserve Bank of India, Mumbai, 2001.
[9] Hemant Patel, & Regina Connolly, "Factors Influencing
Technology Adoption: A Review." in 8th International
Business Information Management Conference,
Dublin, 2007.
[10] O. O. Olasanmi, "Computer Aided Audit Techniques
and Fraud Detection," Research Journal of Financial
Accounting, vol. 4, no. 5, pp. 67-69, 2013.
[11] Braun R.L., & Davis H.E., "Computer-Assisted Audit
Tools and Techniques: Analysis and Perspectives,"
Managerial Auditing Journal, vol. 18, no. 9, pp. 725-
731, 2003.
[12] Janvrin D., Bierstaker J., & Lowe D.J., "An Investigation
of Factors Influencing the Use of Computer-Related
Audit Procedures." Journal of Information Systems,
vol. 23, no. 1, pp. 97-118, 2009.
[13] Venkatesh V., Morris M. G., Davis G. B., & Davis F. D.,
"User Acceptance of Information Technology: Toward
a Unified View," MIS Quarterly, vol. 27, no. 3, pp. 425-
478, 2002.
[14] Siti Subryani Binti Zainol, Azni Suhaily Binmti
Samsuri, Tengku Rahimah Binti Tunku Arifin, Suhaili
Binti Hussin, Maisarah Syazwani Binti Othman, & Sam
Jia Jie, "Determinants of Computer Assisted Audit
Techniques (CAATS) Adoption: A Study in Small and
Medium Practices in Malaysia," European Journal of
Business and Social Sciences, vol. 6, no. 2, pp. 135-150,
2017.
[15] F. D. J. Davis, “A Technology Acceptance Model for
Empirically Testing New End-User Information
Systems: Theory and Results., Massachusetts,” 1980.
[16] M. Fishbein, "A Theory of Reasoned Action: Some
Applications and Implications." Nebraska Symposium
on Motivation, vol. 27, pp. 65-116, 1979.
[17] E. M. Rogers, Diffusion of Innovations, 5 ed., New York:
Free Press, 2003.
[18] Abbas Tashakkori, & John W. Creswell, "The New Era
of Mixed Methods," Journal of Mixed Methods
Research, vol. 1, no. 3, pp. 4-6, 2007.
[19] L. Steve, "AT&T Says Failure was Software Flaw," The
New York Times, 23 April 1998. [Online]. Available:
https://www.nytimes.com/1998/04/23/business/at-
t-says-failure-was-software-flaw.html. [Accessed 17
07 2018].

More Related Content

What's hot

Technology Management and Strategy [Part I]
Technology Management and Strategy [Part I]Technology Management and Strategy [Part I]
Technology Management and Strategy [Part I]Thanakrit Lersmethasakul
 
CompTIA - Brazil Research Summary Final
CompTIA - Brazil Research Summary FinalCompTIA - Brazil Research Summary Final
CompTIA - Brazil Research Summary FinalAssespro Nacional
 
Benefits and Obstacles
Benefits and ObstaclesBenefits and Obstacles
Benefits and ObstaclesPetr Novotný
 
Cloud Insights from 110 Projects
Cloud Insights from 110 ProjectsCloud Insights from 110 Projects
Cloud Insights from 110 ProjectsNone
 
IRJET- Study and Analysis of Time Factor in the Utilization Process
IRJET- Study and Analysis of Time Factor in the Utilization ProcessIRJET- Study and Analysis of Time Factor in the Utilization Process
IRJET- Study and Analysis of Time Factor in the Utilization ProcessIRJET Journal
 
Modernizing IT Operations for Digital Economy
Modernizing IT Operations for Digital EconomyModernizing IT Operations for Digital Economy
Modernizing IT Operations for Digital EconomyBojan Simic
 
Platforms for Growth: Technology Innovations in the Insurance Industry
Platforms for Growth:Technology Innovations in the Insurance IndustryPlatforms for Growth:Technology Innovations in the Insurance Industry
Platforms for Growth: Technology Innovations in the Insurance IndustryState Street
 
IS Audits and Internal Controls
IS Audits and Internal ControlsIS Audits and Internal Controls
IS Audits and Internal ControlsBharath Rao
 
Technology Solutions for Manufacturing
Technology Solutions for ManufacturingTechnology Solutions for Manufacturing
Technology Solutions for ManufacturingInsight
 
International Technology Adoption & Workforce Issues Study - UK Summary
International Technology Adoption & Workforce Issues Study - UK SummaryInternational Technology Adoption & Workforce Issues Study - UK Summary
International Technology Adoption & Workforce Issues Study - UK SummaryCompTIA
 
AWEA Cognitive Analytics for Predictive Futures
AWEA Cognitive Analytics for Predictive FuturesAWEA Cognitive Analytics for Predictive Futures
AWEA Cognitive Analytics for Predictive FuturesSparkCognition
 
Australian IT Industry 2013
Australian IT Industry 2013Australian IT Industry 2013
Australian IT Industry 2013Vishal Sharma
 
Geographic Analytics - How HP Visualises its Supply Chain
Geographic Analytics - How HP Visualises its Supply ChainGeographic Analytics - How HP Visualises its Supply Chain
Geographic Analytics - How HP Visualises its Supply ChainNUS-ISS
 
APPLICATION OF A MULTILEVEL TECHNOLOGY ACCEPTANCE MANAGEMENT MODEL FOR EFFECT...
APPLICATION OF A MULTILEVEL TECHNOLOGY ACCEPTANCE MANAGEMENT MODEL FOR EFFECT...APPLICATION OF A MULTILEVEL TECHNOLOGY ACCEPTANCE MANAGEMENT MODEL FOR EFFECT...
APPLICATION OF A MULTILEVEL TECHNOLOGY ACCEPTANCE MANAGEMENT MODEL FOR EFFECT...ijcsit
 
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...IJERA Editor
 
The New Generation of ETRM Systems
The New Generation of ETRM SystemsThe New Generation of ETRM Systems
The New Generation of ETRM SystemsCTRM Center
 
International Technology Adoption & Workforce Issues Study - Canadian Summary
International Technology Adoption & Workforce Issues Study - Canadian SummaryInternational Technology Adoption & Workforce Issues Study - Canadian Summary
International Technology Adoption & Workforce Issues Study - Canadian SummaryCompTIA
 

What's hot (19)

Technology Management and Strategy [Part I]
Technology Management and Strategy [Part I]Technology Management and Strategy [Part I]
Technology Management and Strategy [Part I]
 
CompTIA - Brazil Research Summary Final
CompTIA - Brazil Research Summary FinalCompTIA - Brazil Research Summary Final
CompTIA - Brazil Research Summary Final
 
50320140501006
5032014050100650320140501006
50320140501006
 
Benefits and Obstacles
Benefits and ObstaclesBenefits and Obstacles
Benefits and Obstacles
 
Cloud Insights from 110 Projects
Cloud Insights from 110 ProjectsCloud Insights from 110 Projects
Cloud Insights from 110 Projects
 
IRJET- Study and Analysis of Time Factor in the Utilization Process
IRJET- Study and Analysis of Time Factor in the Utilization ProcessIRJET- Study and Analysis of Time Factor in the Utilization Process
IRJET- Study and Analysis of Time Factor in the Utilization Process
 
Modernizing IT Operations for Digital Economy
Modernizing IT Operations for Digital EconomyModernizing IT Operations for Digital Economy
Modernizing IT Operations for Digital Economy
 
Platforms for Growth: Technology Innovations in the Insurance Industry
Platforms for Growth:Technology Innovations in the Insurance IndustryPlatforms for Growth:Technology Innovations in the Insurance Industry
Platforms for Growth: Technology Innovations in the Insurance Industry
 
IS Audits and Internal Controls
IS Audits and Internal ControlsIS Audits and Internal Controls
IS Audits and Internal Controls
 
Technology Solutions for Manufacturing
Technology Solutions for ManufacturingTechnology Solutions for Manufacturing
Technology Solutions for Manufacturing
 
International Technology Adoption & Workforce Issues Study - UK Summary
International Technology Adoption & Workforce Issues Study - UK SummaryInternational Technology Adoption & Workforce Issues Study - UK Summary
International Technology Adoption & Workforce Issues Study - UK Summary
 
AWEA Cognitive Analytics for Predictive Futures
AWEA Cognitive Analytics for Predictive FuturesAWEA Cognitive Analytics for Predictive Futures
AWEA Cognitive Analytics for Predictive Futures
 
Australian IT Industry 2013
Australian IT Industry 2013Australian IT Industry 2013
Australian IT Industry 2013
 
Ijaret 06 07_010
Ijaret 06 07_010Ijaret 06 07_010
Ijaret 06 07_010
 
Geographic Analytics - How HP Visualises its Supply Chain
Geographic Analytics - How HP Visualises its Supply ChainGeographic Analytics - How HP Visualises its Supply Chain
Geographic Analytics - How HP Visualises its Supply Chain
 
APPLICATION OF A MULTILEVEL TECHNOLOGY ACCEPTANCE MANAGEMENT MODEL FOR EFFECT...
APPLICATION OF A MULTILEVEL TECHNOLOGY ACCEPTANCE MANAGEMENT MODEL FOR EFFECT...APPLICATION OF A MULTILEVEL TECHNOLOGY ACCEPTANCE MANAGEMENT MODEL FOR EFFECT...
APPLICATION OF A MULTILEVEL TECHNOLOGY ACCEPTANCE MANAGEMENT MODEL FOR EFFECT...
 
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...
 
The New Generation of ETRM Systems
The New Generation of ETRM SystemsThe New Generation of ETRM Systems
The New Generation of ETRM Systems
 
International Technology Adoption & Workforce Issues Study - Canadian Summary
International Technology Adoption & Workforce Issues Study - Canadian SummaryInternational Technology Adoption & Workforce Issues Study - Canadian Summary
International Technology Adoption & Workforce Issues Study - Canadian Summary
 

Similar to IRJET- An Investigation into the Adoption of Computer Assisted Audit Techniques in the Oil and Gas Industry. A Case Study of Tullow Ghana Limited

Note on ‘Mapping’ CAAT Audit technique with 3 practical examples
Note on ‘Mapping’  CAAT Audit technique with  3 practical examplesNote on ‘Mapping’  CAAT Audit technique with  3 practical examples
Note on ‘Mapping’ CAAT Audit technique with 3 practical examplesAnmolDhale2
 
MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...
MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...
MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...csandit
 
IRJET- A Review of Data Mining and its Methods Used in Manufacturing and How ...
IRJET- A Review of Data Mining and its Methods Used in Manufacturing and How ...IRJET- A Review of Data Mining and its Methods Used in Manufacturing and How ...
IRJET- A Review of Data Mining and its Methods Used in Manufacturing and How ...IRJET Journal
 
IRJET- Speech and Hearing
IRJET- Speech and HearingIRJET- Speech and Hearing
IRJET- Speech and HearingIRJET Journal
 
Application of Big Data Systems to Airline Management
Application of Big Data Systems to Airline ManagementApplication of Big Data Systems to Airline Management
Application of Big Data Systems to Airline ManagementIJLT EMAS
 
PLM 2018 - Is Openness really free? A critical analysis of switching costs fo...
PLM 2018 - Is Openness really free? A critical analysis of switching costs fo...PLM 2018 - Is Openness really free? A critical analysis of switching costs fo...
PLM 2018 - Is Openness really free? A critical analysis of switching costs fo...Karan Menon
 
A Survey on Batch Auditing Systems for Cloud Storage
A Survey on Batch Auditing Systems for Cloud StorageA Survey on Batch Auditing Systems for Cloud Storage
A Survey on Batch Auditing Systems for Cloud StorageIRJET Journal
 
IRJET- Vendor Management System using Machine Learning
IRJET-  	  Vendor Management System using Machine LearningIRJET-  	  Vendor Management System using Machine Learning
IRJET- Vendor Management System using Machine LearningIRJET Journal
 
Secured Cloud ERP
Secured Cloud ERPSecured Cloud ERP
Secured Cloud ERPijbuiiir1
 
A Compendium of Various Applications of Machine Learning
A Compendium of Various Applications of Machine LearningA Compendium of Various Applications of Machine Learning
A Compendium of Various Applications of Machine LearningIRJET Journal
 
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...IRJET Journal
 
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...IRJET Journal
 
IRJET- Accident Information Mining and Insurance Dispute Resolution
IRJET- Accident Information Mining and Insurance Dispute ResolutionIRJET- Accident Information Mining and Insurance Dispute Resolution
IRJET- Accident Information Mining and Insurance Dispute ResolutionIRJET Journal
 
NI Automated Test Outlook 2016
NI Automated Test Outlook 2016NI Automated Test Outlook 2016
NI Automated Test Outlook 2016Hank Lydick
 
STS. Smarter devices. Smarter test systems.
STS. Smarter devices. Smarter test systems.STS. Smarter devices. Smarter test systems.
STS. Smarter devices. Smarter test systems.Hank Lydick
 
Simulation for predictive maintenance using weighted training algorithms in ...
Simulation for predictive maintenance using weighted training  algorithms in ...Simulation for predictive maintenance using weighted training  algorithms in ...
Simulation for predictive maintenance using weighted training algorithms in ...IJECEIAES
 
IRJET- Traffic Prediction Techniques: Comprehensive analysis
IRJET- Traffic Prediction Techniques: Comprehensive analysisIRJET- Traffic Prediction Techniques: Comprehensive analysis
IRJET- Traffic Prediction Techniques: Comprehensive analysisIRJET Journal
 
An Approach of Improve Efficiencies through DevOps Adoption
An Approach of Improve Efficiencies through DevOps AdoptionAn Approach of Improve Efficiencies through DevOps Adoption
An Approach of Improve Efficiencies through DevOps AdoptionIRJET Journal
 
Advanced manufacturing technology adoption in manufacturing companies in kenya
Advanced manufacturing technology adoption in manufacturing companies in kenyaAdvanced manufacturing technology adoption in manufacturing companies in kenya
Advanced manufacturing technology adoption in manufacturing companies in kenyaeSAT Journals
 
Generalized Overview of Go-to-Market Concept for Smart Manufacturing
Generalized Overview of Go-to-Market Concept for Smart ManufacturingGeneralized Overview of Go-to-Market Concept for Smart Manufacturing
Generalized Overview of Go-to-Market Concept for Smart ManufacturingIRJET Journal
 

Similar to IRJET- An Investigation into the Adoption of Computer Assisted Audit Techniques in the Oil and Gas Industry. A Case Study of Tullow Ghana Limited (20)

Note on ‘Mapping’ CAAT Audit technique with 3 practical examples
Note on ‘Mapping’  CAAT Audit technique with  3 practical examplesNote on ‘Mapping’  CAAT Audit technique with  3 practical examples
Note on ‘Mapping’ CAAT Audit technique with 3 practical examples
 
MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...
MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...
MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...
 
IRJET- A Review of Data Mining and its Methods Used in Manufacturing and How ...
IRJET- A Review of Data Mining and its Methods Used in Manufacturing and How ...IRJET- A Review of Data Mining and its Methods Used in Manufacturing and How ...
IRJET- A Review of Data Mining and its Methods Used in Manufacturing and How ...
 
IRJET- Speech and Hearing
IRJET- Speech and HearingIRJET- Speech and Hearing
IRJET- Speech and Hearing
 
Application of Big Data Systems to Airline Management
Application of Big Data Systems to Airline ManagementApplication of Big Data Systems to Airline Management
Application of Big Data Systems to Airline Management
 
PLM 2018 - Is Openness really free? A critical analysis of switching costs fo...
PLM 2018 - Is Openness really free? A critical analysis of switching costs fo...PLM 2018 - Is Openness really free? A critical analysis of switching costs fo...
PLM 2018 - Is Openness really free? A critical analysis of switching costs fo...
 
A Survey on Batch Auditing Systems for Cloud Storage
A Survey on Batch Auditing Systems for Cloud StorageA Survey on Batch Auditing Systems for Cloud Storage
A Survey on Batch Auditing Systems for Cloud Storage
 
IRJET- Vendor Management System using Machine Learning
IRJET-  	  Vendor Management System using Machine LearningIRJET-  	  Vendor Management System using Machine Learning
IRJET- Vendor Management System using Machine Learning
 
Secured Cloud ERP
Secured Cloud ERPSecured Cloud ERP
Secured Cloud ERP
 
A Compendium of Various Applications of Machine Learning
A Compendium of Various Applications of Machine LearningA Compendium of Various Applications of Machine Learning
A Compendium of Various Applications of Machine Learning
 
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
 
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
 
IRJET- Accident Information Mining and Insurance Dispute Resolution
IRJET- Accident Information Mining and Insurance Dispute ResolutionIRJET- Accident Information Mining and Insurance Dispute Resolution
IRJET- Accident Information Mining and Insurance Dispute Resolution
 
NI Automated Test Outlook 2016
NI Automated Test Outlook 2016NI Automated Test Outlook 2016
NI Automated Test Outlook 2016
 
STS. Smarter devices. Smarter test systems.
STS. Smarter devices. Smarter test systems.STS. Smarter devices. Smarter test systems.
STS. Smarter devices. Smarter test systems.
 
Simulation for predictive maintenance using weighted training algorithms in ...
Simulation for predictive maintenance using weighted training  algorithms in ...Simulation for predictive maintenance using weighted training  algorithms in ...
Simulation for predictive maintenance using weighted training algorithms in ...
 
IRJET- Traffic Prediction Techniques: Comprehensive analysis
IRJET- Traffic Prediction Techniques: Comprehensive analysisIRJET- Traffic Prediction Techniques: Comprehensive analysis
IRJET- Traffic Prediction Techniques: Comprehensive analysis
 
An Approach of Improve Efficiencies through DevOps Adoption
An Approach of Improve Efficiencies through DevOps AdoptionAn Approach of Improve Efficiencies through DevOps Adoption
An Approach of Improve Efficiencies through DevOps Adoption
 
Advanced manufacturing technology adoption in manufacturing companies in kenya
Advanced manufacturing technology adoption in manufacturing companies in kenyaAdvanced manufacturing technology adoption in manufacturing companies in kenya
Advanced manufacturing technology adoption in manufacturing companies in kenya
 
Generalized Overview of Go-to-Market Concept for Smart Manufacturing
Generalized Overview of Go-to-Market Concept for Smart ManufacturingGeneralized Overview of Go-to-Market Concept for Smart Manufacturing
Generalized Overview of Go-to-Market Concept for Smart Manufacturing
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 

Recently uploaded (20)

OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 

IRJET- An Investigation into the Adoption of Computer Assisted Audit Techniques in the Oil and Gas Industry. A Case Study of Tullow Ghana Limited

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1146 An Investigation into the Adoption of Computer Assisted Audit Techniques in the Oil and Gas Industry. A case study of Tullow Ghana Limited Alexander Braye1, Mutala Mohammed2, Darryl Mensah3 1Computer Networking Lecturer, Ghana Technology University College (G.T.U.C), Takoradi Campus, Ghana 2Computer Security Lecturer, Ghana Technology University College (G.T.U.C), Takoradi Campus, Ghana 3Information Technology Officer, Tullow Ghana Limited, Takoradi Office, Ghana ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - As technology is being introduced by organizations in making work efficient and effective, the security of these technologies is of great importance as data from these organizations keeps expanding. It is, therefore, imperative to ensure these technologies are audited to ensure there are no glitches or vulnerabilities. The main objective of this study is to examine the Technology Acceptance Model and the Diffusion of Innovation Theory in the adoption of computer assisted audit techniques in the Oil and Gas industry in Ghana. The data collected from the questionnaire were analyzed using a mixed methodology that is quantitative and qualitative. Priority was given to the quantitative methodology in collecting and analyzing data for the study. A secondary survey was used to grab evidence for the analysis of the study. This helped to get opinions, attitudes and description for the study. Based on the key findings of the research, an organization in adopting a technology for its systems auditing is greatly influenced by the behavior of its employees in accepting technology use as explained by [1] in his Technology acceptance model. Key Words: Technology Acceptance Model, Adoption, CAATs, Oil and Gas 1. INTRODUCTION Today’s organisations operate in a dynamic global- market environment with focus on operating in a collaborative and strict requirement in the telecommunications network notwithstanding the location of other branches of their organisation. These organisations irrespective of their size or scope of business have come to realise the importance of adopting technology to compete in the global market. They however, invest greatly in designing and implementing systems that are complex and sometimes challenging to manage. With the advancement of technology, organisations are becoming more dependent on information systems to do their businesses. As they adopt these systems in service delivery, and engage in a paperless system or transaction these data collected keeps growing by the day. These data could either be financial or non-financial transactions as well as network logs. For this data to be effectively managed, it calls for the need to adopt the Computer Assisted Audit Tools (CAATs) in analysing data. The process of auditing information systems is characterised by adopting tools and techniques in Computer Information Systems which is mostly referred to as Computer-Assisted Audit Tools and techniques (CAATs). CAATs is a means by which organisations adopt the use of technology for monitoring and compliance auditing [2]. CAATs provide an efficient and effective means for IT auditors to achieve their audit objective [3]. Computer Assisted Audit Techniques (CAATs) represents the usage of technology by an auditor to assist in the completion of an audit process [4][11]. CAATs are tools and techniques adopted by either internal or external auditors in the process of auditing an organisation with the purpose of collecting data from their systems [5]. The availability and usage of data is the most important aspect of business growth, as a result the confidentiality, integrity, reliability and availability of data and system processes are a major concern or influence of IT audit. The use of Computer-Assisted Audit tools and Techniques (CAATs) is often associated with data mining which extracts data for analysis. Due to the enormous growth of data and transactional processing in today’s economy, organisations can hardly function efficiently without the use of technology in their operations [6]. Information system audit ensures organisational data is confidentially stored, and data is always made available for authorised users always [7]. The adoption of CAAT’s does not only apply to its usage in banks or financial institutions for detecting fraud but also by oil and gas exploration and production companies, especially in the deep-water where large amount of data and information systems is adopted, auditing manually would be tedious. Anantha Sayana, in 2003 classified the use of CAATs into four broad categories;  Data Analysis Software  Network Security Evaluation  Operating Systems (OS) and Database Management System (DBMS) Security Evaluation Software/Utilities Software and Code Testing Tools
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1147 This research seeks to explore the motivational factors in implementing or adopting CAATS in the oil and gas exploration and production industry in Ghana, using Tullow Ghana Limited as a case study. As the oil wells in locations close to the ports and cities, (otherwise known as On-shore drilling) often dry-up, oil and gas exploration and production companies like Exxon, Total, Shell, Chevron and others have resorted to exploration and drilling in the deep waters offshore. These industries adapt the use of technologies like video conferencing and VSAT (Very-Small-Aperture-Terminal) in their operational mechanism for increasing growth and productivity in their operations. VSAT systems use commercial satellite connections as a high-speed digital link between locations, which are traditionally impossible to access. VSAT technology is mostly used by banks and oil companies in their operations because of its success in supplying connectivity to its remote locations. 2. LITERATURE REVIEW 2.1 Introduction This chapter highlights various theories in adopting and accepting technology in auditing information systems by organizations. There have been many researches done in the past referring to Computer Assisted Audit Tools (CAATs). Researchers have also come up with their findings based on the importance of information systems in business operations. CAATs is a technique that involves the use of technology that is computer programs by auditors or system auditors during the process of audit to enable them to achieve the general objectives of auditing [8]. Researchers have carried out different studies on the adoption of technology by organizations and have examined theories like the diffusion of innovation, theory of reasoned action, and the theory of behavior to support their literature [9]. A study by [6] on using CAATs to support information systems classified CAATs into four categories; namely, Data Analysis Software, Network Security Evaluation, Operating System (OS) and Database Management Systems (DBMS) Security Evaluation Software, and Software and Code Testing Tools. [10] on referencing other researches in CAATs usage, stated that CAATs can be used or is mostly used by banks or financial institutions for investigating fraud and detecting anomalies in transactions. [4][11] conducted a survey on governmental auditors regarding their use of Audit Command Language (ACL) a commercially available CAAT. Participants perceived the potential benefits of ACL, but displayed a lower confidence in their technical abilities to use ACL. Despite the benefits of the usage of CAATs in the auditing process and standards, audit technologies in the audit firms, previous studies show that auditors do not often use CAATs when auditing [12]. 2.2 Theoretical Framework The academic basis in the adoption of technology is known as Unified Theory of Acceptance and Use of Technology (UTAUT). UTAUT is a unified model developed by [13] who adopted, examined, compared and tested eight theories of competition in this area of research. Various researchers in the past have tried to find general factors that influence users when technology options were adopted for a variety of realms. These models have been adopted in Information Technology decisions from a psychological perspective from which it first originated. These models include the Technological Adoption Model (TAM), Innovation Diffusion Theory (IDT), Social Cognitive Theory (SCT), Theory of Reasoned Action (TRA), Theory of Planned Behavior (TPB), Motivation Model (MM), the Model of Personal Computation Utilization (MPCU) and a combination of Technology Acceptance/Adoption Model and Theory of Planned Behavior. [13] having reviewed all eight models, established a theoretical and experimental similarities across the eight models of the UTAUT. A recent study also by [14], who adopt four hypothesis referencing [13] four construct of the UTAUT. In the hypothesis stated: a. “H1: Performance Expectancy (PE) positively affects the behaviour intention in the adoption of CAATS i.e. performance expectancy would increase when technology is adopted in auditing”. b. “H2: Effort Expectancy (EE) positively affects behavioral intention in the adoption of CAATS i.e. if technology is easy to be used, then individuals would be willing to learn and adopt to the new features”. c. “H3: Social Influence (SI) positively affects behavioral intention to adopt CAATS”. d. “H4: Facilitating Conditions (FC) positively affects behavioral intention to adopt CAATS” Fig -2.1: UTAUT as proposed by Venkatesh et al (2003) The figure above shows the conceptual framework as proposed as “constructs” of the UTAUT by Venkatesh et al (2003). The four constructs are the Performance Expectancy, Social Influence, Facilitating Conditions and Effort Expectancy as illustrated in Fig-2.1 above.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1148 2.3 THEORETICAL REVIEW 2.3.1 TECHNOLOGY ACCEPTANCE MODEL (TAM) Technology Acceptance Model (TAM) is an information system theory that demonstrates how users accept and use a technology [15]. It suggests that when users are presented with a new technology, many factors influence their decision about how and when they will use it. TAM as introduce by [1] stated the influencing factors for accepting technology as; 1. Perceived usefulness (PU) “the degree to which a person believes that using a particular system would enhance his or her job performance”. 2. Perceived Ease-Of-Use (PEOU) “the degree to which a person believes that using a particular system would be free from effort”. Davis, on relying on prior work by [16], who formulated the theory of Reasoned Action stated a conceptual model to propose the Technology Acceptance Model (TAM) as shown in Figure 2.2 below. Fig -2.2: Original TAM (Davis 1986) The TAM model as proposed by Davis, shown in Figure 2.2 above with arrows illustrates causal relationships. In this model, “a potential user’s overall attitude toward using a given system is hypothesized to be a major determinant of whether he actually uses it. Attitude towards using, in turn, is a function of two major beliefs: perceived usefulness and perceived ease of use. Perceived ease of use has a causal effect on perceived usefulness. Design features directly influences perceived usefulness and perceived ease of use.” Referencing [16] model, the relationship of the TAM model can be expressed in four equations: 1. 2. 3. 4. 2.3.2 DIFFUSION OF INNOVATION THEORY The Diffusion of Innovation (DOI) is a theory proposed by [17], to explain how, and why a technology can be adopted. Rogers defines diffusion as “the process in which an innovation is communicated through a certain channel over a period among the members of a social system”. According to his theory, the adoption of a new technology mostly undergoes a process of decision making amongst individuals or groups. He further explains that an innovation or technology may already be in existence but once a group or individual finds it to be new to them, then it can still be considered as an innovation for that group or individual. For [17], an organization in making the decision to adopt an innovation or adopt a new technology they must undergo a five-step process of making an innovation-decision; Knowledge, Persuasion, Decision, Implementation and Confirmation. Once this process is assumed the organization or individual can finally make the decision to either implement or reject a technology or innovation. Fig -2.3: Five stages in the Decision Innovation Process as proposed by [17] 3.0 METHODOLOGY The researchers in getting a better understanding of the research problems adopted the mixed methodology that is a combination of the quantitative and qualitative methodology of collecting and analyzing data for the study [18]. Priority was however, given to the quantitative methodology in collecting and analyzing the data. A secondary survey was used to grab evidence for the analysis of the study. This helped to get opinions, attitudes and description for the study. Some of the data collected were from interviews carried out on phone conversations and via face to face with selected infrastructure specialists of the case study company.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1149 Tullow Ghana Limited was selected because it is a leading independent oil and gas, exploration and production company in Ghana and also adopts the use of technology in their day to day operations. A sample size of 50 respondents was selected from Tullow Ghana Limited for this study. To ensure validity and reliability of the data collected for this study, the researchers exercise care to ensure that the responses are those that have been released by the respondents of the selected case study company. The data was collated from questionnaires that were given to respondents online (using: Google forms) to answer without any undue influence, link to the questionnaires were sent to some respondents on WhatsApp platform whiles some respondents were e-mailed the link to fill out the questionnaire online. The data collected was analyzed quantitatively. They were first edited to ensure consistency, which would then be coded and analyzed by a combination of descriptive accounts and summary statistics in terms of frequencies and percentages. 4. DATA ANALYSIS 4.1 Demographic Background Table 4.1 below gives the frequency distribution of respondents (in this case the staff of Tullow Ghana Limited); 24 of the respondents representing 48% who were presented with the questionnaire were in the age range of 31-40 years, 20 (40%) were in the 20-30 age group and 6 (12%) were in the 41-50 age group. The distribution shows that 88.0% of workers who answered the questionnaire were less than 40 years, suggesting a young workforce that should have a working knowledge of information technology. Table -4.1: Age Group of Respondents Age Distribution of Respondents Age group Frequency Percent (%) 20-30 20 40.0 31-40 24 48.0 41-50 6 12.0 Total 50 100.0 As indicated in Table 4.2 below, 34 (64%) of the respondents indicated that there are applications and processes implemented by the Information Systems Department in auditing company assets (systems and phones). Information Systems Assets and Procurement Administrator stated through an interview to confirm that when new users join the company they are taken through the new starter process and once a login credential is created, a ticket is logged to the Asset team to issue out assets to the users. Table -4.2: Are there any tools, applications or processes in recording assets issued out to staffs? Availability of Means of Measure Analysis Response Frequency Percent (%) Yes 34 68.0 No 10 20.0 Not Applicable 6 12.0 Total 50 100.0 All respondents representing 100% indicated that IT assets are audited periodically by the organization, however they could not state the exact period assets are audited as Table 4.3 depicts. Out of the 50 respondents, 26% responded asset audit was carried out as per the Auditors discretion, 32% responded quarterly, 30% responded annually whereas 12% responded audit was carried out monthly. Table - 4.3: How often are IT assets audited? Frequency of Auditing of IT Assets Response Frequency Percent (%) Monthly 6 12.0 Annually 15 30.0 Quarterly 16 32.0 As per Auditors discretion 13 26.0 Total 50 100.0 As illustrated in Table 4.4 below, all respondents (100%) confirmed the organization uses security tools to scan all computers on the network, install patches and uninstall unauthorized applications or browsers by end- user systems. As confirmed by a Security Analyst in an interview over the telephone and asked how often this tool was run on systems he responded, “as and when it’s needed, and the process is automated”. He also stated that during the process when patches are running on the computers users are not given the option to cancel or close the patch installation and compliance check, but once the process has successfully been completed the application closes by itself. There is normally no exemption of user systems when the process/exercise is running or carried out.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1150 Table 4.4: Does the company use technology for compliance checks on systems? Response to Compliance Check Response Frequency Percent (%) Yes 50 100.0 4.2 Attitudes towards the use of CAATs Exactly 43 (86%) indicated that the company adopt computer assisted audit tools and techniques in systems auditing process, 7 (14%) said no, as indicated in Table 4.5 below. Generally, the company adopts computer assisted audit tools and techniques in systems auditing process. Table 4.5: Does the company adopt Computer assisted audit tools and techniques in systems auditing process? Response to Adoption of CAATs Response Frequency Percent (%) Yes 43 86.0 No 7 14.0 Total 50 100.0 When finding out from respondents whether adopting CAATs in auditing information systems has come to replace the manual way of auditing the systems, 31(62%) of the respondents say “Yes”, whereas 19(38%) said it is not the case as indicated in table 4.6 below. Table 4.6: Has CAATs in auditing replace the manual way of auditing? Response on Manual to CAATs Adoption Response Frequency Percent (%) Yes 31 62.0 No 19 38.0 Total 50 100.0 From Table 4.7 below a greater percentage of the respondents 38 (76%) stated that employees believed that the introduction of IT has influenced their works by making it efficient and effective. The remaining 12 (24%) stated otherwise, by indicating that there is the need to continual updating themselves in the usage of IT to remain competitive in their profession. Table 4.7: What is the attitude of employees towards the adoption of Computer Assisted Audit Tools and Techniques? Response to Attitude of Employees to CAATs Description Freq. Percent (%) Employees believe that the introduction of IT has an influence in making their work efficient and effective. 38 76.0 Employees believe in continually updating themselves in the use of IT to remain competitive in their profession. 12 24.0 Total 50 100.0 In knowing the opinion of the respondents on the effects of the adoption of IT tools and techniques in the company 43 (68%) stated that the introduction of IT serves as a tool for helping them work effectively, 10 (16%) indicated that IT tools serves as a tool for work. 6 (10%) indicated that it was difficult to ignore IT tools when working, the remaining 4 (6%) stated its introduction distracts their actual work. All the responses are depicted in Table 4.8 below. Table 4.8: What is your opinion about the adoption of IT tools and techniques in the company? (Multiple responses, n = 63) Responses to Opinions of employees on CAATs Opinion Frequenc y Percent (%) Its introduction distracts the actual work 4 6.0 IT serves as a tool that helps in working 43 68.0 Serves as a tool for work 10 16.0 Difficult to ignore when working 6 10.0 Total 63 100.0 5.0 CONCLUSION Based on the key findings of the research an organization in adopting a technology for its systems auditing is greatly influenced by the behavior of its employees in accepting technology use as explained by [1] in his Technology acceptance model.
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1151 Also, the behavior of personnel towards the introduction of new technologies is very important in an organization. Whiles some employees embrace new technologies and avail themselves to expand their knowledge to learn new technologies others are reluctant and fear the introduction and acceptance of these technologies in working. REFERENCES [1] F. Davis, "Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology," MIS Quarterly, vol. 13, pp. 319-339, 1989. [2] Glen C. Mueller, "Using Computer Assisted Audit Techniques for More Effective Compliance Auditing and Monitoring in the Healthcare Organisations," pp. 1-3. [3] S. W. Tommie (Ph.D), "Data Extraction, A Hindrance to Using CAATs," ISACA Journal, vol. 6, pp. 7-7, 2010. [4] Braun R. L., & Davis H. E., "Computer-Assisted Audit Tools and Techniques: Analysis and Perspectives." Managerial Auditing Journal, vol. 18, no. 9, pp. 725- 731, 2003. [5] Andreas Kiesow, Michael Fellamann, Novica Zarvic, & Oliver Thomas, "Managing Internal Control: Designing a Wiki-Based Information System for Continuous Process Assurance," Thirty Sixth International Conference on Information Systems, Fort Worth, Texas, 2015. [6] A. S. Sayana, "Using CAATs to Support IS Audit," Information Systems Control Journal ISSN: 1526- 7407, vol. 1, pp. 21-23, 2003. [7] H. Ocharo, “The Importance of Information Systems, Japan: https://www.linkedin.com/pulse/20140620054920- 64969119-the-importance-of-information-systems- audit/, 2014. [8] V. Kamessam (The Governor), "Information Systems Auditing Policy for Banking and Financial Sector," Working Group, Information Technology Dept., Reserve Bank of India, Mumbai, 2001. [9] Hemant Patel, & Regina Connolly, "Factors Influencing Technology Adoption: A Review." in 8th International Business Information Management Conference, Dublin, 2007. [10] O. O. Olasanmi, "Computer Aided Audit Techniques and Fraud Detection," Research Journal of Financial Accounting, vol. 4, no. 5, pp. 67-69, 2013. [11] Braun R.L., & Davis H.E., "Computer-Assisted Audit Tools and Techniques: Analysis and Perspectives," Managerial Auditing Journal, vol. 18, no. 9, pp. 725- 731, 2003. [12] Janvrin D., Bierstaker J., & Lowe D.J., "An Investigation of Factors Influencing the Use of Computer-Related Audit Procedures." Journal of Information Systems, vol. 23, no. 1, pp. 97-118, 2009. [13] Venkatesh V., Morris M. G., Davis G. B., & Davis F. D., "User Acceptance of Information Technology: Toward a Unified View," MIS Quarterly, vol. 27, no. 3, pp. 425- 478, 2002. [14] Siti Subryani Binti Zainol, Azni Suhaily Binmti Samsuri, Tengku Rahimah Binti Tunku Arifin, Suhaili Binti Hussin, Maisarah Syazwani Binti Othman, & Sam Jia Jie, "Determinants of Computer Assisted Audit Techniques (CAATS) Adoption: A Study in Small and Medium Practices in Malaysia," European Journal of Business and Social Sciences, vol. 6, no. 2, pp. 135-150, 2017. [15] F. D. J. Davis, “A Technology Acceptance Model for Empirically Testing New End-User Information Systems: Theory and Results., Massachusetts,” 1980. [16] M. Fishbein, "A Theory of Reasoned Action: Some Applications and Implications." Nebraska Symposium on Motivation, vol. 27, pp. 65-116, 1979. [17] E. M. Rogers, Diffusion of Innovations, 5 ed., New York: Free Press, 2003. [18] Abbas Tashakkori, & John W. Creswell, "The New Era of Mixed Methods," Journal of Mixed Methods Research, vol. 1, no. 3, pp. 4-6, 2007. [19] L. Steve, "AT&T Says Failure was Software Flaw," The New York Times, 23 April 1998. [Online]. Available: https://www.nytimes.com/1998/04/23/business/at- t-says-failure-was-software-flaw.html. [Accessed 17 07 2018].