Suchergebnisse
Filter
3 Ergebnisse
Sortierung:
SSRN
Working paper
Resolving Difficult Accounting Issues: A Case Study in Client-Auditor Interaction
In: Issues in accounting education, Band 17, Heft 1, S. 27-39
ISSN: 1558-7983
This case requires you to consider the complexities of auditing in terms of a realistic client-auditor interaction involving difficult accounting issues. The case is loosely based on an actual situation that occurred between an audit firm and its client. In the case you will assume the role of either the auditor or the client as you attempt to resolve inventory and accounts receivable valuation issues for which there are no "clear-cut" solutions. This case includes three sections. First, you will read an article containing an auditor-independence risk framework to help you understand how client-auditor interactions relate to auditor independence risk. Second, you will develop alternative solutions to the inventory and accounts receivable valuation issues in your respective auditor or client group. Third, you will interact with another group assuming the opposite role and you will resolve the valuation issues in some way. By completing the case, you will learn about client-auditor relationship/interaction issues, client-auditor economic incentives, and auditor independence risk issues.
Information system security policy noncompliance: the role of situation-specific ethical orientation
In: Information, technology & people, Band 34, Heft 1, S. 250-296
ISSN: 1758-5813
PurposeThis study examines how neutralization strategies affect the efficacy of information system security policies. This paper proposes that neutralization strategies used to rationalize security policy noncompliance range across ethical orientations, extending from those helping the greatest number of people (ethics of care) to those damaging the fewest (ethics of justice). The results show how noncompliance differs between genders based on those ethical orientations.Design/methodology/approachA survey was used to measure information system security policy noncompliance intentions across six different hypothetical scenarios involving neutralization techniques used to justify noncompliance. Data was gathered from students at a mid-western, comprehensive university in the United States.FindingsThe empirical analysis suggests that gender does play a role in information system security policy noncompliance. However, its significance is dependent upon the underlying neutralization method used to justify noncompliance. The role of reward and punishment is contingent on the situation-specific ethical orientation (SSEO) which in turn is a combination of internal ethical positioning based on one's gender and external ethical reasoning based on neutralization technique.Originality/valueThis study extends ethical decision-making theory by examining how the use of punishments and rewards might be more effective in security policy compliance based upon gender. Importantly, the study emphasizes the interplay between ethics, gender and neutralization techniques, as different ethical perspectives appeal differently based on gender.