Cloud-Computing Risk Disclosure and ICFR Material Weakness: The Moderating Role of Accounting Reporting Complexity

2018 ◽  
Vol 33 (3) ◽  
pp. 1-17 ◽  
Author(s):  
Antoinette L. Smith ◽  
Yibo (James) Zhang ◽  
Peter C. Kipp

ABSTRACT Regulators have expressed concerns over management's ability to maintain effective ICFR when adopting cloud-computing services (PCAOB 2015), as well as the auditor's ability to cope with such changes (PCAOB 2015, 2017). Further, the complexity of the client's accounting concepts, proxied by their XBRL taxonomy, could adversely impact financial reporting quality. We investigate the association between a firm's disclosure of cloud-computing risks and its likelihood of disclosing a material weakness, moderated by its level of accounting reporting complexity. We find that, for firms that identify cloud-computing as a significant risk, the external auditor is less likely to issue a material weakness when the firm uses a greater number of customized XBRL tags. We also find that the external auditor is more likely to issue a material weakness for firms that do not identify cloud-computing as a significant risk to their operations when they use a greater number of customized XBRL tags. Data Availability: Data are publicly available from sources identified in the paper.

2020 ◽  
Vol 34 (2) ◽  
pp. 125-145 ◽  
Author(s):  
Shu-Miao Lai ◽  
Chih-Liang Liu ◽  
Sheng-Syan Chen

SYNOPSIS We investigate whether the quality of internal control over financial reporting (ICOFR) has implications for the quality of internal control over fixed assets by examining the relation between material weaknesses (MWs) and investment efficiency. After excluding restating firms and controlling for externally reported earnings quality and the potential endogeneity of material weakness disclosure, we find that managers in firms with weak ICOFR are more likely to make inefficient investments. This relation is stronger when investment-specific MWs are related to capital expenditure and property, plant, and equipment. We further show a significantly negative relation between future cash flows and investments made by firms with weak ICOFR. Overall, our findings are distinct from prior studies in that they are independent of financial reporting quality and suggest that weak ICOFR implies that internal controls over fixed assets failed as well. Data Availability: Data are available from public sources identified in the paper.


2014 ◽  
Vol 3 ◽  
pp. 94-112
Author(s):  
Angelė Pečeliūnaitė

The article analyses the possibility of how Cloud Computing can be used by libraries to organise activities online. In order to achieve a uniform understanding of the essence of technology SaaS, IaaS, and PaaS, the article discusses the Cloud Computing services, which can be used for the relocation of libraries to the Internet. The improvement of the general activity of libraries in the digital age, the analysis of the international experience in the libraries are examples. Also the article discusses the results of a survey of the Lithuanian scientific community that confirms that 90% of the scientific community is in the interest of getting full access to e-publications online. It is concluded that the decrease in funding for libraries, Cloud Computing can be an economically beneficial step, expanding the library services and improving their quality.


Author(s):  
Shengju Yang

In order to solve the trust problems between users and cloud computing service providers in cloud computing services, the existing trust evaluation technology and access control technology in the cloud computing service are analyzed. And the evaluation index of cloud computing is also analyzed. Users can calculate the relevant indicators of cloud computing service according to their own business goals, and choose the appropriate cloud computing services according to their own trust need. In addition, the reliability assessment method of users based on the service process is proposed. Cloud computing access control system can be used for user credibility evaluation, and it can handle user access requests according to user's creditability. In the study, a cloud computing service trust evaluation tool is designed, and the modeling and architecture designs of trust evaluation are also given. The effectiveness of the method is verified by experiments on cloud computing service evaluation methods.


2021 ◽  
Vol 10 (5/6) ◽  
pp. 533
Author(s):  
Moulhime El Bekkali ◽  
Benaissa Bernoussi ◽  
Mohammed Fattah ◽  
Said Mazer ◽  
Younes Balboul ◽  
...  

Cloud computing services mature both economically and technologically and play a more and more extensive role in the domain of software and information systems engineering. SaaS offers advantage for both service providers and consumers. SaaS is faced with the question of appropriate techniques applying at early phase of Requirements engineering of producing system. The paper highlights two traditional methods namely i* and VORD belonging respectively to Goal oriented Requirements Engineering and Viewpoints approaches. The approach proposed try to dealing with the requirements elicitation in the context of Software-as-a-service SaaS. So, the approach benefits from strengths of both VORD and i* models and propose a combination of them in a new approach namely VORDi*.


Sign in / Sign up

Export Citation Format

Share Document