default search action
International Journal of Accounting Information Systems, Volume 5
Volume 5, Number 1, May 2004
- Steve G. Sutton:
Editors comments: Rediscovering our IS roots. 1-4 - Jacob M. Rose, F. Douglas Roberts, Anna M. Rose:
Affective responses to financial data and multimedia: the effects of information load and cognitive load. 5-24 - Andreas I. Nicolaou:
Quality of postimplementation review for enterprise resource planning systems. 25-49 - Bruce Dehning, Kevin E. Dow, Theophanis Stratopoulos:
Information technology and organizational slack. 51-63 - Daniel E. O'Leary:
On the relationship between REA and SAP. 65-81
Volume 5, Number 2, July 2004
- J. Efrim Boritz:
Foreword. 83 - Gerald Trites:
Director responsibility for IT governance. 89-99 - Ed O'Donnell:
Discussion of director responsibility for IT governance: a perspective on strategy. 101-104 - Tony J. Read:
Discussion of director responsibility for IT governance. 105-107 - Richard B. Dull, David P. Tegarden:
Using control charts to monitor financial reporting of public companies. 109-127 - Severin Grabski:
Discussion of supporting continuous monitoring using control charts. 129-130 - Mark C. Davies:
Discussion of supporting continuous monitoring using control charts. 131-134 - Richard B. Dull, David P. Tegarden:
Reply to the discussions of using control charts to monitor financial reporting of public companies. 135-137 - Uday S. Murthy, S. Michael Groomer:
A continuous auditing web services model for XML-based accounting systems. 139-163 - Eric E. Cohen:
Discussion of a continuous auditing Web Services model for XML-based accounting systems. 165-168 - Clinton E. White:
Discussion of CAWS model for XML-based accounting systems. 169-173 - Uday S. Murthy, S. Michael Groomer:
Reply to the discussions of a Continuous Auditing Web Services model for XML-based accounting systems. 175-181 - Michael G. Alles, Alexander Kogan, Miklos A. Vasarhelyi:
Restoring auditor credibility: tertiary monitoring and logging of continuous assurance systems. 183-202 - Paul John Steinbart:
Discussion of restoring auditor credibility: tertiary monitoring and logging of continuous assurance systems. 203-205 - Eckhardt Kriel:
Discussion of restoring auditor credibility: tertiary monitoring and logging of continuous auditing systems. 207-209 - Michael G. Alles, Alexander Kogan, Miklos A. Vasarhelyi:
Reply to the discussions of "Restoring Auditor Credibility: Tertiary Monitoring and Logging of Continuous Assurance Systems". 211-212 - Marilyn M. Greenstein, Thomas E. McKee:
Assurance practitioners' and educators' self-perceived IT knowledge level: an empirical assessment. 213-243 - Doug Wilkinson:
The CICA's IT competency model. 245-250 - Alan T. Lord:
ISACA model curricula 2004. 251-265 - Carla Carnaghan:
Discussion of IT assurance competencies. 267-273 - Brian Leader:
Discussion of IT assurance competencies. 275-279
Volume 5, Number 3, October 2004
- Steve G. Sutton:
Editor's comments. 281-284 - Claire Marston, Annika Polei:
Corporate reporting on the Internet by German companies. 285-311 - Ronald J. Daigle, James C. Lampe:
The impact of the risk of consequence on the relative demand for continuous online assurance. 313-340 - Paul D. Hutchison, Craig G. White, Ronald J. Daigle:
Advances in Accounting Information Systems and International Journal of Accounting Information Systems: first ten volumes (1992-2003). 341-365
Volume 5, Number 4, December 2004
- W. Ken Harmon:
Fourth International Research Symposium on Accounting Information Systems. 369-370 - Paul L. Bowen, Fiona H. Rohde, Chiu Yueh Alice Wu:
Imperfect communication between information requestors and information providers: the effects of syntactic and extraneous ambiguity. 371-394 - Elaine G. Mauldin, Sandra B. Richtermeyer:
An analysis of ERP annual report disclosures. 395-416 - James E. Hunton, W. Ken Harmon:
A model for investigating telework in accounting. 417-427 - Fiona H. Rohde:
IS/IT outsourcing practices of small- and medium-sized manufacturers. 429-451
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.