<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//TaxonX//DTD Taxonomic Treatment Publishing DTD v0 20100105//EN" "../../nlm/tax-treatment-NS0.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:tp="http://www.plazi.org/taxpub" article-type="research-article" dtd-version="3.0" xml:lang="en">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">69</journal-id>
      <journal-id journal-id-type="index">urn:lsid:arphahub.com:pub:8D21F818-6EEF-540F-91C7-D50E3E5A13E0</journal-id>
      <journal-title-group>
        <journal-title xml:lang="en">Maandblad voor Accountancy en Bedrijfseconomie</journal-title>
        <abbrev-journal-title xml:lang="en">MAB</abbrev-journal-title>
      </journal-title-group>
      <issn pub-type="ppub">0924-6304</issn>
      <issn pub-type="epub">2543-1684</issn>
      <publisher>
        <publisher-name>Amsterdam University Press</publisher-name>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">10.5117/mab.99.140994</article-id>
      <article-id pub-id-type="publisher-id">140994</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Literature Review</subject>
        </subj-group>
        <subj-group subj-group-type="scientific_subject">
          <subject>Bestuurlijke informatieverzorging (Management information)</subject>
          <subject>Overige vakgebieden (Other disciplines)</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>﻿Evolution of IT auditing in a nutshell – journey towards a dynamic landscape</article-title>
      </title-group>
      <contrib-group content-type="authors">
        <contrib contrib-type="author" corresp="no">
          <name name-style="western">
            <surname>van den Heuvel</surname>
            <given-names>Edouard</given-names>
          </name>
          <uri content-type="orcid">https://orcid.org/0009-0001-7615-4300</uri>
          <xref ref-type="aff" rid="A1">1</xref>
        </contrib>
      </contrib-group>
      <aff id="A1">
        <label>1</label>
        <addr-line content-type="verbatim">University of Amsterdam, Amsterdam, Netherlands</addr-line>
        <institution>University of Amsterdam</institution>
        <addr-line content-type="city">Amsterdam</addr-line>
        <country>Netherlands</country>
      </aff>
      <author-notes>
        <fn fn-type="edited-by">
          <p>Academic editor: Barbara Majoor</p>
        </fn>
      </author-notes>
      <pub-date pub-type="collection">
        <year>2025</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>25</day>
        <month>04</month>
        <year>2025</year>
      </pub-date>
      <volume>99</volume>
      <issue>2</issue>
      <fpage>73</fpage>
      <lpage>83</lpage>
      <uri content-type="arpha" xlink:href="http://openbiodiv.net/99975830-0F07-512D-AF6C-B64E32D28027">99975830-0F07-512D-AF6C-B64E32D28027</uri>
      <history>
        <date date-type="received">
          <day>04</day>
          <month>11</month>
          <year>2024</year>
        </date>
        <date date-type="accepted">
          <day>15</day>
          <month>04</month>
          <year>2025</year>
        </date>
      </history>
      <permissions>
        <copyright-statement>Edouard van den Heuvel</copyright-statement>
        <license license-type="creative-commons-attribution" xlink:href="https://creativecommons.org/licenses/by-nc-nd/4.0/" xlink:type="simple">
          <license-p>This is an open access article distributed under the terms of the Creative Commons Attribution License (CC BY-NC-ND 4.0), which permits to copy and distribute the article for non-commercial purposes, provided that the article is not altered or modified and the original author and source are credited.</license-p>
        </license>
      </permissions>
      <abstract>
        <label>﻿Abstract</label>
        <p>This paper offers a comprehensive analysis of the evolution of IT auditing amidst the dynamic digital transformation landscape. It delves into the profound changes in IT auditing driven by historical, technological, regulatory, and professional factors. The study identifies and explores pivotal drivers that have influenced this evolution and its integration into modern audit practices. It concludes that the multifaceted development of IT auditing is the result of interconnected factors. Altogether, these drivers have contributed to the transformation and integration of IT auditing into contemporary audit practices, with the paper summarizing and explaining eight key drivers.</p>
      </abstract>
      <kwd-group>
        <label>Keywords</label>
        <kwd>IT auditing</kwd>
        <kwd>evolution</kwd>
        <kwd>digital transformation</kwd>
        <kwd>technology integration</kwd>
        <kwd>auditing practices</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="﻿Relevance to practice" id="SECID0ENC">
      <title>﻿Relevance to practice</title>
      <p>In today’s tech-dependent economic environment, understanding the evolution of IT auditing is essential not just for operational efficiency but for securing IT systems and managing risks effectively. Knowing how IT auditing has changed is vital in today’s tech-focused economy. This knowledge helps improve how businesses run, protect IT-systems, and manage risk better. As IT auditing now extends beyond traditional assessments, it plays a pivotal role in optimizing audit methodologies, ensuring regulatory compliance, mitigating cybersecurity and business risks, and facilitating informed decision-making in an increasingly digital landscape.</p>
    </sec>
    <sec sec-type="﻿1. Introduction" id="SECID0ESC">
      <title>﻿1. Introduction</title>
      <p>The auditing profession, broadly defined as the independent and objective assessment of audit subjects—ranging from financial statements to business processes, organizational culture and behavior, quality management systems, IT systems, and more – has a longstanding history. This study aims to analyze the development of auditing from when the first literature was formulated, to better understand the background of auditing and the evolution into IT auditing. The word ‘appears to be derived from the Latin word ‘audire’, which means “to hear”. <xref ref-type="bibr" rid="B15">Flint (1988)</xref> describes auditing as a social phenomenon that serves neither value nor purpose, except for its practical usefulness, and states that its existence is entirely utilitarian. The function of auditing, however, has evolved in response to a perceived need of individuals or groups in society. Groups or individuals seek reassurance or information about the performance or conduct of others in which they have a legitimate and acknowledged interest.</p>
      <p>Internal or operational auditing is the auditing of governance, business processes, management accounting by a dedicated function in the organization, reporting to the board and to the audit committee. External or financial auditing is the auditing of the annual financial statements by an independent external auditor. A specific breed of auditing, which has developed during the last half century, is the auditing of IT systems, in the broadest sense. This paper seeks to explore integrated IT auditing practices in an era marked by the pervasive influence of the digital transformation in our societies and the global economy. As a component of both internal and financial auditing, but also as an independent activity, IT auditing has increased in intensity and intricacy. This increase is inextricably tied to the integration of technology into the critical operations of contemporary organizations. Gartner reported in 2013 that IT expenditures surpassed <abbrev xlink:title="United States" id="ABBRID0E5C">US</abbrev> $3 billion annually, with organizations allocating an average of 4.4% of their operating expenses to IT (<xref ref-type="bibr" rid="B6">Asen et al. 2019</xref>). In 2019, a substantial increase from 4.4% to 20% was noted, whereby the previously noted 4.4% was solely dedicated to cybersecurity within the operational IT expense.</p>
      <p>The rapid integration of digital technologies into modern enterprises has reshaped business operations and governance, making IT auditing pivotal in ensuring the integrity, security, and reliability of IT systems (<xref ref-type="bibr" rid="B9">Berghout and Fijneman 2023</xref>). Hence, understanding the history of IT auditing, its alignment with technological advancements, and its future prospects is crucial for practitioners, academics, and stakeholders. This research aims to contribute to the existing body of knowledge by providing a thorough analysis of the evolution of IT auditing practices, the interplay between technological advancements and demands, and the transformative potential of emerging technologies. By addressing the research question below, this study aspires to enhance IT auditing practices, leading to more effective risk management, increased auditing accuracy, and improved organizational decision making in a progressively more complex digital landscape. Thereby the following research question has been drafted:</p>
      <p><italic>To what extent has the practice of IT auditing evolved over time, from its inception during the early days of auditing to its current state, and what are the key factors that have influenced its development and adaptation</italic>?</p>
      <p>In addition to analyzing the evolution of IT auditing practices, this study provides key drivers for future research grounded in a thorough review of existing literature. This research explores the evolution of IT auditing and proposes significant areas for future investigation after thoroughly examining existing literature on the subject. These recommendations are designed to assist IT specialists and others in enhancing their auditing techniques. This will help them manage risks better, make audits more accurate, and improve decision-making in a rapidly changing digital world. Nonetheless, several digital aspects, such as cloud computing, data privacy, and the integration of <abbrev xlink:title="artificial intelligence" id="ABBRID0ESD">AI</abbrev>, require further focus. This shows that more research and improvement are needed in these areas.</p>
    </sec>
    <sec sec-type="methods" id="SECID0EWD">
      <title>﻿2. Method</title>
      <p>This historical analysis enables us to understand, analyze and interpret the evolution of the function of audits whereby the change in expectations of society plays a significant role. The review will be divided into meaningful periods from before 1840 until the present.</p>
      <p>This study provides a chronological literature study which represents a deliberate and purposeful decision aimed at providing a comprehensive and nuanced understanding of the subject matter. Organizing the literature review in a chronological order, allows for the exploration of the historical development and evolution of key concepts, theories, and methodologies relevant to the research domain. This study facilitates the identification of signi­ficant shifts, trends, and paradigmatic changes over time, enabling a more profound analysis of how the field of auditing has evolved and responded to various influences.</p>
      <p>Furthermore, the chronological literature methodology provides a structured narrative that elucidates the progression of ideas, debates, and advancements within the field of IT auditing. It allows for tracing the lineage of theories and identifying pivotal moments. This approach not only enhances the clarity and coherence of the literature review but also highlights the intellectual genealogy that has contributed to the formation of the current state of knowledge. By engaging with the literature chronologically, this study not only positions itself within the broader historical discourse but also contributes to the academic community by offering a synthesized narrative that can enrich the collective understanding of the developments within IT auditing in the era of digital transformation.</p>
      <sec sec-type="﻿2.1. Prior to 1840" id="SECID0E4D">
        <title>﻿2.1. Prior to 1840</title>
        <p>Neither a historical development nor a chronological literature review has been properly described yet (<xref ref-type="bibr" rid="B33">Lee 1994</xref>). The earliest checking activities were reportedly found in the ancient civilizations (<xref ref-type="bibr" rid="B32">Lee 1986</xref>), but also in Greece and Egypt (Boyd 1905). The closest checking activities to the present-day auditing were found in Greece around 350 B.C., where their existence is described by Aristotle, as cited by (<xref ref-type="bibr" rid="B38">McMickle 1978</xref>):</p>
        <p>
          <italic>Ten [logistae]….and ten [euthuni].. are chosen by lot. Every single public officer must account to them. They have sole control over those subject to [examination].. they place their findings before the courts. Anyone against whom they prove embezzlement is convicted and fined by the court ten times the sum discovered stolen. Anyone whom the court on [their].. evidence convicts of corruption, is also fined ten times the amount of bribe. If he is found guilty of administrative error, they assess the sum involved, and he is fined that amount provided in this case that he pays it within nine months; otherwise the fine is doubled.</italic>
        </p>
        <p>A similarity with Aristotle was found in the ancient Exchequer of England (1100–1135), where special audit officers were appointed to make sure that expenditure transactions and state revenue were properly accounted for. The person with the responsibility for examinations was known as the ‘auditor’. The role of such examinations was to detect and prevent fraudulent actions (<xref ref-type="bibr" rid="B1">Abdel-Quader 2022</xref>). Moreover, the existence of checking activities was also found in Italian city states. Auditors were used by the merchants of Venice, Genoa and Florence to verify the riches brought by captains returning from the distant journeys and bound for the European continent. Again, this form of auditing was considered to prevent fraud (<xref ref-type="bibr" rid="B10">Brown 1962</xref>).</p>
        <p>During the pre-industrial era, the commercial industry was characterized by a smaller scale of operations, primarily consisting of individually owned (family) companies, which resulted in a lack of hierarchical structures and reporting lines to managers or directors. The limited scale and decentralized nature of the pre-industrial commercial industry resulted in a relatively low demand for auditing practices, as the need for formalized oversight and control mechanisms was not as pronounced (<xref ref-type="bibr" rid="B48">Porter et al. 2005</xref>).</p>
        <p>To summarize, auditing in the period pre-1840 was restricted to performing a detailed verification of every transaction, whereby the concept of sampling or testing was not part of the auditing procedure.</p>
      </sec>
      <sec sec-type="﻿2.2. The period 1840s–1920s" id="SECID0EEF">
        <title>﻿2.2. The period 1840s–1920s</title>
        <p>The industrial revolution during the period from 1840s to the 1920s made a significant change in the practice of auditing (<xref ref-type="bibr" rid="B16">Gill and Cosserat 1996</xref>). During the industrial revolution, large-scale operations drove the corporate form of enterprise to the foreground (<xref ref-type="bibr" rid="B10">Brown 1962</xref>). <xref ref-type="bibr" rid="B1">Abdel-Quader (2022)</xref> concurred that in this period machine-based production and large factories were established. Capital was needed to facilitate the significant changes in industry. The middle class provided the funds for the establishment of commercial and industrial undertakings. However, this period was highly speculative and unregulated as procedures and standards were not formally described and executed. Therefore, the liability was not limited, and the rate of financial failure was high. There was a great need for protection for companies and small investors (<xref ref-type="bibr" rid="B48">Porter et al. 2005</xref>). The development of the auditing profession was necessary to help society by enabling control and reducing risk; thus, auditing entered the professional sphere.</p>
        <p>In 1844, the Joint Stock Companies Act was passed in the United Kingdom; this act was a direct response to socio-developments in the <abbrev xlink:title="United Kingdom" id="ABBRID0E3F">UK</abbrev> during that period and the desire to transform unincorporated associations with many members, typical for those times, into incorporated companies with joined stocks, which made legal proceedings easier. The Joint Stock Companies Act described that ‘directors shall cause the Books of the Company to be balanced, and a full and fair Balance Sheet to be made up’. Additionally, and most importantly, the act stipulated the involvement of auditors to check the accounts of the company. This notwithstanding, the requirement of a statutory audit and the annual presentation of the balance sheet to shareholders was only made mandatory in the 1900s under the <abbrev xlink:title="United Kingdom" id="ABBRID0EAG">UK</abbrev> Companies Act 1962 (<xref ref-type="bibr" rid="B34">Leung et al. 2007</xref>).</p>
        <p>In the early years of this 1900s, the accountant was normally a company manager with responsibilities to ensure the proper use of the funds entrusted to him (<xref ref-type="bibr" rid="B48">Porter et al. 2005</xref>). The auditors were shareholders chosen by their fellow members, which allows for favoritism. <xref ref-type="bibr" rid="B11">Brown (1982)</xref> adds that auditors were required to perform the completeness of transactions contributed to the correct accounts and financial statements. Still, little attention was paid to the internal control environment of companies.</p>
        <p>According to <xref ref-type="bibr" rid="B48">Porter et al. (2005)</xref>, the auditor and related duties were highly influenced by the decisions of judicial courts. In the literature two cases were found that concur with the statement of <xref ref-type="bibr" rid="B48">Porter et al. (2005)</xref>. First, the verdicts from the case of Kingston Cotton Mill (1896) and later, the case of London and General Bank (1985). Both cases reinforced that the objective of audits was to find errors and detect fraud. The verdicts explicitly described the desired role of the auditor as cited by Leung et al. (2004, P.7): <italic>a practical manual for auditors, the objective was (a) the detection of fraud; (b) the detection of technical errors and (c) the detection of errors in principles</italic>.</p>
        <p>To summarize, the role of auditors during the period from 1840s to the 1920s was mainly about fraud detection and in the assessment of completeness of transactions in the financial statements of companies.</p>
      </sec>
      <sec sec-type="﻿2.3. The period 1920s–1960s" id="SECID0E6G">
        <title>﻿2.3. The period 1920s–1960s</title>
        <p>During the period from the 1920s to the 1960s, economic development predominantly centered on the United Kingdom (<abbrev xlink:title="United Kingdom" id="ABBRID0EFH">UK</abbrev>), despite the period of the Great Depression around 1930 (<xref ref-type="bibr" rid="B4">Armstrong 1987</xref>), which some may question. However, the evolution of auditing practices gradually shifted from the <abbrev xlink:title="United Kingdom" id="ABBRID0ENH">UK</abbrev> to the United States (<abbrev xlink:title="United States" id="ABBRID0ERH">US</abbrev>), particularly during the post-Wall Street Crash (1929) recovery years when business entities experienced significant growth. This shift was also facilitated by advancements in credit-granting institutions and securities markets, contributing to the development of the capital market. As small-sized companies transitioned into professional organizations with a need for a clear separation of ownership and management functions, a necessity arose to ensure the reliability of financial transactions and flows from investors to companies, thus emphasizing the importance of providing a true and fair representation of a company’s performance and position (<xref ref-type="bibr" rid="B48">Porter et al. 2005</xref>).</p>
        <p>In the context of auditing, the primary objective during this era was to provide reliability and credibility to financial statements presented by company managers to their shareholders. A noticeable shift occurred from a focus on fraud detection towards enhancing the credibility of financial statements. This transformation is evident in successive editions of Montgomery’s Auditing text, which emphasized that the auditor’s objective went beyond detecting fraud and extended to verifying the fairness and accuracy of financial statements. <xref ref-type="bibr" rid="B41">Montgomery’s 1934</xref> edition noted that the detection of fraud was an important but incidental objective of an audit, while the 1940 edition emphasized that the primary responsibility for controlling and discovering irregularities lay with management (<xref ref-type="bibr" rid="B41">Montgomery 1934</xref>, <xref ref-type="bibr" rid="B42">1940</xref>).</p>
        <p>By 1939, the profession of auditing had witnessed rapid growth (<xref ref-type="bibr" rid="B40">Mock and Jerry 1981</xref>), prompting the American Institute of Accountants to establish a committee on auditing procedure. This committee’s main purpose was to address the increasing complexity of modern businesses and provide guidance on auditing procedures. Rather than revising existing documents, the committee chose to issue Statements on Auditing Procedure (SAPs), leading to the publication of the first auditing pamphlet in 1939. SAP1 highlighted the role of the auditor’s judgment in designing audit programs, particularly in determining the extent of sampling and testing based on the auditor’s assessment of the effectiveness of internal control.</p>
        <p>During this period, the concepts of materiality (<xref ref-type="bibr" rid="B49">Queenan 1946</xref>) and sampling techniques (<xref ref-type="bibr" rid="B40">Mock and Jerry 1981</xref>; <xref ref-type="bibr" rid="B10">Brown 1962</xref>) emerged as significant developments. The growing volume of financial transactions in companies prompted auditors to adopt a more statistical approach, reducing the necessity for verifying all transactions individually. SAP1 and the statements of <xref ref-type="bibr" rid="B54">Short (1940)</xref> highlighted that detailed examination of every entry, footing, and posting was no longer required, marking a shift towards statistical sampling techniques.</p>
        <p>In 1949, the committee on auditing procedure conducted a study focused on the nature and characteristics of internal control. This study laid the foundation for the discussion of sampling techniques and materiality and provided a graphical representation of internal control within companies. The initial definition of internal control encompassed various measures within a business including safeguarding assets, ensuring the accuracy and reliability of the accounting data, promoting operational efficiency, and encourage adherence to managerial policies. This broad definition recognized that internal control extended beyond accounting and financial functions, and encompassed activities such as budgetary control, standard costs, training programs, and quality control (<xref ref-type="bibr" rid="B10">Brown 1962</xref>).</p>
        <p>The auditing profession underwent significant transformations during these years, with increased emphasis on internal control systems, sampling techniques, and objective assessments of financial transactions and company performance. Shareholders’ demand for a formal, objective view of their investments led to many reports and discussions on the internal control environment and the assessment of financial transactions. Various accountant professionals introduced their definitions and elaborated on characteristics of internal control, focusing on segregation of responsibilities, authorization systems, and appropriate duties and functions across organizational departments (<xref ref-type="bibr" rid="B10">Brown 1962</xref>; <xref ref-type="bibr" rid="B3">American Institute of Accountants 1949</xref>).</p>
        <p>Around the 1960s, the development of auditing was highly influential, with companies beginning to highlight characteristics of their audit approaches. This marked the beginning of the reliance on internal control systems and sampling techniques in auditing practices. Audit evidence was increasingly gathered through an assessment from an objective third party via physical observations, reflecting a growing emphasis on reliability assurance as organizations became more accountable for their financial statements, both internally and externally (<xref ref-type="bibr" rid="B48">Porter et al. 2005</xref>).</p>
      </sec>
      <sec sec-type="﻿2.4. The period 1960s–1970s" id="SECID0EWBAC">
        <title>﻿2.4. The period 1960s–1970s</title>
        <p>During the period under consideration, characterized by optimism, idealism, and economic growth, significant developments occurred in technology and the complexity of companies. Auditors played a crucial role in enhancing the credibility of financial information in the 1970s. While Leung et al. (2004) suggested that the role of auditors remained largely unchanged during this period, <xref ref-type="bibr" rid="B13">Davies et al. (1999)</xref> take a different stance, asserting that auditing underwent critical developments in the 1970s.</p>
        <p>One notable shift in auditing during this time was a heightened focus on the stability of the internal control environment within companies. Auditors transitioned from primarily verifying transactions in the books to placing greater reliance on internal control systems. This shift was driven by the economic growth, which resulted in a substantial increase in the number of transactions. Auditors found it increasingly impractical to verify all transactions individually. Therefore, they began relying more on effective internal control systems. By around 1980, auditors were required to document internal controls and accounting systems, which reduced the need for extensive substantive testing when the internal control environment was effective (<xref ref-type="bibr" rid="B51">Salehi 2007</xref>).</p>
        <p>The early 1970s witnessed another change in auditors’ approaches. The process of completing assessments was deemed too expensive and time-consuming, leading auditors to adopt cost-effective strategies. They started making greater use of analytical procedures, primarily driven by the introduction of risk-based auditing (<xref ref-type="bibr" rid="B57">Turley and Cooper 2005</xref>). Risk-based auditing focused on collecting information about high-risk aspects of the management system related to specific objectives. Auditors emphasized critical aspects of processes with the potential for errors, requiring a deep understanding of clients, policies, and key personnel. This methodology placed significant emphasis on examining audit evidence in terms of identified risks, rather than assessing all financial transactions comprehensively.</p>
        <p>This era also marked the widespread integration of computers in business, particularly in accounting. By 1975, a substantial number of computers were in use, predominantly for accounting-related applications. The introduction of Electronic Data Processing (<abbrev xlink:title="Electronic Data Processing" id="ABBRID0EOCAC">EDP</abbrev>) systems revolutionized how data was stored, retrieved, and controlled, resulting in debates within the literature. Auditors needed to understand these systems to comprehend underlying transaction calculations. The American Institute of Certified Public Accountants (<abbrev xlink:title="American Institute of Certified Public Accountants" id="ABBRID0ESCAC">AICPA</abbrev>) released guidelines in 1968, addressing <abbrev xlink:title="Electronic Data Processing" id="ABBRID0EWCAC">EDP</abbrev> audits, leading to the development of <abbrev xlink:title="Electronic Data Processing" id="ABBRID0E1CAC">EDP</abbrev> auditing practices (<xref ref-type="bibr" rid="B29">Kee 1993</xref>).</p>
        <p><abbrev xlink:title="Electronic Data Processing" id="ABBRID0EEDAC">EDP</abbrev> auditors formed the Electronic Data Processing Association (<abbrev xlink:title="Electronic Data Processing Association" id="ABBRID0EIDAC">EDPA</abbrev>) to establish standards, procedures, and guidelines for <abbrev xlink:title="Electronic Data Processing" id="ABBRID0EMDAC">EDP</abbrev> audits. In 1977, Control Objectives around <abbrev xlink:title="Electronic Data Processing" id="ABBRID0EQDAC">EDP</abbrev> were published, later evolving into Control Objectives for Information and related Technology (<abbrev xlink:title="Control Objectives for Information and related Technology" id="ABBRID0EUDAC">CobiT</abbrev>). Consequently, rapid technological changes, information security and <abbrev xlink:title="Electronic Data Processing" id="ABBRID0EYDAC">EDP</abbrev> concerns began to emerge in academic literature (Ramamoorti and Weidenmier 2003). However, <abbrev xlink:title="Electronic Data Processing" id="ABBRID0E3DAC">EDP</abbrev> auditing was not yet a distinct profession but was discussed as a subtopic within internal or financial auditing.</p>
        <p>Professional associations, in contrast, were proactive in addressing <abbrev xlink:title="Electronic Data Processing" id="ABBRID0ECEAC">EDP</abbrev> issues. <abbrev xlink:title="American Institute of Certified Public Accountants" id="ABBRID0EGEAC">AICPA</abbrev> published guidance on Auditing and <abbrev xlink:title="Electronic Data Processing" id="ABBRID0EKEAC">EDP</abbrev> in 1969, followed by the Statement of Auditing Standards (<abbrev xlink:title="Statement of Auditing Standards" id="ABBRID0EOEAC">SAS</abbrev>) No. 3, which introduced the terms general and application controls. The <abbrev xlink:title="Electronic Data Processing" id="ABBRID0ESEAC">EDP</abbrev> Auditors Association (<abbrev xlink:title="EDP Auditors Association" id="ABBRID0EWEAC">EDPAA</abbrev>), now <abbrev xlink:title="Information Systems and Control Association" id="ABBRID0E1EAC">ISACA</abbrev>, was formalized in 1969. The Institute of Internal Auditors (<abbrev xlink:title="Institute of Internal Auditors" id="ABBRID0E5EAC">IIA</abbrev>) also responded with a focus on <abbrev xlink:title="Electronic Data Processing" id="ABBRID0ECFAC">EDP</abbrev> auditing in 1973. A few auditors explored combined assurance practices, hiring specialized auditors for different aspects (<xref ref-type="bibr" rid="B39">Miller 1972</xref>).</p>
        <p>The early integration of computer techniques led to the development of tools such as generalized audit software, <abbrev xlink:title="Electronic Data Processing" id="ABBRID0EMFAC">EDP</abbrev> control questionnaires, Computer Assisted Audit Tools/Techniques (<abbrev xlink:title="Computer Assisted Audit Tools/Techniques" id="ABBRID0EQFAC">CAATs</abbrev>), and integrated test facilities (<abbrev xlink:title="integrated test facilities" id="ABBRID0EUFAC">ITF</abbrev>). While some authors advocated for auditors to develop <abbrev xlink:title="Electronic Data Processing" id="ABBRID0EYFAC">EDP</abbrev> audit skills, others expressed concerns about the cost of training, cooperation between <abbrev xlink:title="Electronic Data Processing" id="ABBRID0E3FAC">EDP</abbrev> auditors and non-specialized auditors, and the reliability of IT. Ultimately, a consensus was reached that all auditors needed to update their skills to adapt to technological advancements (<xref ref-type="bibr" rid="B53">Seiler 1972</xref>; <xref ref-type="bibr" rid="B23">Holmes 1975</xref>).</p>
        <p>To summarize, this era witnessed the rapid adoption of technology within auditing, with a focus on addressing the risks introduced by technological advancements. Auditors with various specializations collaborated to develop effective approaches to auditing. The profession of auditing was attractive due to the career possibilities it offered, whether in financial, internal, or <abbrev xlink:title="Electronic Data Processing" id="ABBRID0EKGAC">EDP</abbrev> auditing. Governmental jurisdiction over the <abbrev xlink:title="Electronic Data Processing" id="ABBRID0EOGAC">EDP</abbrev> auditing profession was not clearly defined, but the focus was primarily on how to conduct audits rather than determining who should perform them.</p>
      </sec>
      <sec sec-type="﻿2.5. The period 1970s–1980s" id="SECID0ESGAC">
        <title>﻿2.5. The period 1970s–1980s</title>
        <p>During the 1970s and 1980s, the applications of computers expanded beyond mere accounting tasks. They started to be utilized in other crucial sectors, such as production and inventory management. One of the most critical technological advances during this time was Material Requirements Planning (<abbrev xlink:title="Material Requirements Planning" id="ABBRID0EYGAC">MRP</abbrev>), an early way to use computers to manage inventory (<xref ref-type="bibr" rid="B5">Azizi et al. 2024</xref>). At first, <abbrev xlink:title="Material Requirements Planning" id="ABBRID0EAHAC">MRP</abbrev> was all about determining what materials were needed to meet production plans. However, over the years, it changed to include Distribution Resource Planning (<abbrev xlink:title="Distribution Resource Planning" id="ABBRID0EEHAC">DRP</abbrev>), warehouse management, and other critical supply chain tasks, bringing in more parts of managing operations.</p>
        <p>The move to <abbrev xlink:title="Material Requirements Planning" id="ABBRID0EKHAC">MRP</abbrev> led to the creation of Manufacturing Resource Planning (<abbrev xlink:title="Material Requirements Planning" id="ABBRID0EOHAC">MRP</abbrev> II). This improved system included planning when to make products, managing the workspace, and keeping track of supplies, influencing almost every part of a company. For IT auditors, this was the first time dealing with checking systems that weren’t just about money data (<xref ref-type="bibr" rid="B5">Azizi et al. 2024</xref>). Auditing has become more complicated because it now requires understanding how different parts of the business work together in these systems. Auditors must ensure that the business operations and the financial information are reliable (<xref ref-type="bibr" rid="B43">Nguyen et al. 2023</xref>). This implies that they must acquire knowledge beyond standard accounting, including insights into production, logistics of delivery, and inventory management.</p>
        <p>The <abbrev xlink:title="Institute of Internal Auditors" id="ABBRID0E3HAC">IIA</abbrev> expressed interest in the <abbrev xlink:title="Electronic Data Processing" id="ABBRID0EAIAC">EDP</abbrev> audit field, suggesting its integration into their working domain. The <abbrev xlink:title="EDP Auditors Association" id="ABBRID0EEIAC">EDPAA</abbrev> responded by asserting its jurisdiction and providing the Certified Information Systems Auditor (<abbrev xlink:title="Certified Information Systems Auditor" id="ABBRID0EIIAC">CISA</abbrev>) certification. The <abbrev xlink:title="Institute of Internal Auditors" id="ABBRID0EMIAC">IIA</abbrev>, however, failed to secure a prominent leadership role in <abbrev xlink:title="Electronic Data Processing" id="ABBRID0EQIAC">EDP</abbrev> audit, leading to <abbrev xlink:title="EDP Auditors Association" id="ABBRID0EUIAC">EDPAA</abbrev>’s prominence in this complex field (Ramamoorti and Weidenmier 2003).</p>
        <p>As technology continued to advance during the mid-1970s, there was a growing need for professional guidance related to technology and <abbrev xlink:title="Electronic Data Processing" id="ABBRID0E1IAC">EDP</abbrev> auditing. Technology development often outpaced its implementation, leading to debates and discussions in the literature. Foreign Corrupt Practices Act scandals contributed to the maturation and growth of <abbrev xlink:title="Electronic Data Processing" id="ABBRID0E5IAC">EDP</abbrev> as an audit profession (<xref ref-type="bibr" rid="B56">Toms 2019</xref>). Internal auditors began incorporating <abbrev xlink:title="Electronic Data Processing" id="ABBRID0EGJAC">EDP</abbrev> into their practices, giving rise to the concept of “Operational Audit” and a shift in focus towards determining who should perform <abbrev xlink:title="Electronic Data Processing" id="ABBRID0EKJAC">EDP</abbrev> audits.</p>
        <p>Towards the end of this period, corporate financial scandals, such as the banking crisis of 1974–75, were marked by accounting manipulation facilitated by the incorporation of IT into business processes. These scandals led to further legislative scrutiny of the <abbrev xlink:title="Electronic Data Processing" id="ABBRID0EQJAC">EDP</abbrev> profession.</p>
        <p>To summarize, this period witnessed significant technological advancements and the expansion of auditing beyond accounting. It marked the growth of <abbrev xlink:title="Electronic Data Processing" id="ABBRID0EWJAC">EDP</abbrev> as an audit profession, increased collaboration between different types of auditors, and the development of professional standards and certifications. The era was also characterized by corporate scandals that highlighted the importance of internal control and <abbrev xlink:title="Electronic Data Processing" id="ABBRID0E1JAC">EDP</abbrev> audit in financial reporting and accountability.</p>
      </sec>
      <sec sec-type="﻿2.6. The period 1980s – late 1990s" id="SECID0E5JAC">
        <title>﻿2.6. The period 1980s – late 1990s</title>
        <p>During the period spanning from the early 1980s to the late 1990s, significant environmental factors led to the professional transformation of the Electronic Data Processing (<abbrev xlink:title="Electronic Data Processing" id="ABBRID0EEKAC">EDP</abbrev>) profession. Developments during this period included the establishment of the Committee of Sponsoring Organizations (COSO) through a joint initiative involving <abbrev xlink:title="American Institute of Certified Public Accountants" id="ABBRID0EIKAC">AICPA</abbrev>, <abbrev xlink:title="Institute of Internal Auditors" id="ABBRID0EMKAC">IIA</abbrev>, and IMA. This collaboration aimed to enhance guidance, reduce fraudulent financial statements, and improve financial reporting quality. Additionally, professional organizations such as the Association of Certified Fraud Examiners (ACFE) which emerged in 1988, contributed to updated guidance on internal control.</p>
        <p>Technological growth and adoption, coupled with legislative changes like the Federal Sentencing Guidelines for Organizations (<abbrev xlink:title="Federal Sentencing Guidelines for Organizations" id="ABBRID0ESKAC">FSGO</abbrev>), incentivized organizations to bolster their internal auditing frameworks. The introduction of the IBM AS/400 in 1988 marked a shift in the use of computers, extending beyond organizational settings to private use. Moreover, the National Science Foundation’s endorsement of TCP/IP in 1992 facilitated the commercial use of the Internet, leading to greater decentralization of data processing (<xref ref-type="bibr" rid="B59">Zairi 1994</xref>).</p>
        <p>The integration of technology into organizations prompted the need for systems and automation, resulting in the emergence of Enterprise Resource Planning (<abbrev xlink:title="Enterprise Resource Planning" id="ABBRID0E3KAC">ERP</abbrev>) systems like SAP. This period also witnessed a shift in terminology from <abbrev xlink:title="Electronic Data Processing" id="ABBRID0EALAC">EDP</abbrev> to IT (ISCA 2019)), reflecting a focus on technology-related aspects. The <abbrev xlink:title="EDP Auditors Association" id="ABBRID0EELAC">EDPAA</abbrev> transformed into the Information Systems and Control Association (<abbrev xlink:title="Information Systems and Control Association" id="ABBRID0EILAC">ISACA</abbrev>), aligning itself with the evolving landscape.</p>
        <p>Academic research on <abbrev xlink:title="Electronic Data Processing" id="ABBRID0EOLAC">EDP</abbrev> was initially limited but gained momentum in the late 1980s with the introduction of research journals like The Journal of Information Systems and the Managerial Auditing Journal (<xref ref-type="bibr" rid="B2">Amer et al. 1987</xref>). However, the focus on <abbrev xlink:title="Electronic Data Processing" id="ABBRID0EWLAC">EDP</abbrev> within these publications remained relatively minor. A shift toward more academic research can be observed, with a decrease in articles related to systems auditing and internal control. Qualitative studies and surveys declined, giving way to modeling and experiments in research methods (Samuels and Steinbart 2022; <xref ref-type="bibr" rid="B24">Hutchison et al. 2004</xref>).</p>
        <p>The role of IT auditors and their skills underwent examination, with studies indicating that auditors were more efficient, particularly in IT and general control domains. Meanwhile, a growing reliance on advanced computer auditing tools as well as the provision of advisory services by auditors became more prevalent (<xref ref-type="bibr" rid="B58">Vasarhelyi and Halper 1991</xref>).</p>
        <p>The time from the 1980s to the late 1990s was marked by fast improvements in technology, especially with computers. During this time, Mainframe computers became popular, bringing all IT work together in one place. Data Centers were created and became the main hub for business computing. The development of Electronic Data Processing (<abbrev xlink:title="Electronic Data Processing" id="ABBRID0EGMAC">EDP</abbrev>) auditing during this period significantly changed IT auditors’ jobs (<xref ref-type="bibr" rid="B5">Azizi et al. 2024</xref>). <abbrev xlink:title="Electronic Data Processing" id="ABBRID0EOMAC">EDP</abbrev> auditing, which started as part of general financial checks, began developing into a separate area. This change happened because businesses increasingly use computer systems to handle their work. There is an increased demand for specialists to assess these systems’ safety, efficiency, and reliability.</p>
        <p>Mainframe audits looked at how well these extensive computer systems worked and how secure they were since many organizations relied on them for essential tasks. Data Center audits, however, focused on the rules and protections in the data centre, including who could enter, plans for recovering from disasters and making sure the systems were always available (Treasury Inspector General for Tax Administration , 2022). IT auditors needed to learn special skills in building systems, keeping data safe and accurate, and following security rules. This change to more detailed audits focusing on specific systems meant that auditors needed to stay updated with new technology and how businesses increasingly depend on digital systems.</p>
        <p>As IT grew in new business areas, ensuring rules were followed and accurate data became very important for auditors. During this time, a significant change happened. Auditors started to do more than just check financial information; they also had to ensure the computer systems that managed this information were safe and working well.</p>
      </sec>
      <sec sec-type="﻿2.7. The period 1990s–2010s" id="SECID0EUMAC">
        <title>﻿2.7. The period 1990s–2010s</title>
        <p>This period in the field of auditing and IT can be divided into two distinct halves, each marked by its unique characteristics and challenges. The first half of this period was influenced significantly by the Sarbanes-Oxley Act (<abbrev xlink:title="Sarbanes-Oxley Act" id="ABBRID0E1MAC">SOx</abbrev>). Particularly Section 404, which became effective later in 2004, placed an emphasis on the importance of internal controls and IT auditing. Technological changes were also significant during this period, with a significant increase in IT spending per worker between 1995–2005, resulting in increased productivity for IT auditors (<xref ref-type="bibr" rid="B37">McAfee and Brynjolfsson 2008</xref>).</p>
        <p>The 1990s to the 2010s was a transformative period in IT auditing due to the rapid digitization of business operations and the rise of outsourcing. During this time, most organizations began outsourcing non-core IT functions like software development, help desk support, and infrastructure maintenance to reduce costs and focus on their core competencies (<xref ref-type="bibr" rid="B46">Olagunju and Owolabi 2020</xref>). However, this outsourcing led to significant challenges in maintaining in-house expertise and deep knowledge of technical details. With the loss of direct control over IT operations, organizations faced risks associated with outsourced IT functions’ reliability, security, and compliance. IT auditors had to address these risks by ensuring that third-party providers adhered to the organization’s internal control frameworks and maintained the same high data integrity and security standards.</p>
        <p>At the same time, the increasing complexity of IT systems, particularly with the widespread adoption of Enterprise Resource Planning (<abbrev xlink:title="Enterprise Resource Planning" id="ABBRID0EKNAC">ERP</abbrev>) systems, demanded new auditing approaches. <abbrev xlink:title="Enterprise Resource Planning" id="ABBRID0EONAC">ERP</abbrev> systems like SAP, Oracle, and PeopleSoft integrated various business processes into a single unified system, including finance, supply chain management, human resources, and customer relationship management (<xref ref-type="bibr" rid="B46">Olagunju and Owolabi 2020</xref>). This integration made it critical for auditors to understand the interconnected nature of these systems, as a single failure or security breach could impact multiple areas of the business.</p>
        <p>The complexity of <abbrev xlink:title="Enterprise Resource Planning" id="ABBRID0EYNAC">ERP</abbrev> systems and their centrality to business operations meant IT auditors needed to collaborate more closely with business stakeholders, management, and technical teams to ensure that controls were adequately designed and implemented. Additionally, as organizations became more dependent on these integrated systems, the need for IT governance frameworks, such as COBIT (Control Objectives for Information and Related Technologies) and ISO/IEC 27001, grew (<xref ref-type="bibr" rid="B5">Azizi et al. 2024</xref>). These frameworks helped provide a standardized approach to IT management and auditing, ensuring that all aspects of the IT infrastructure, from security to data management, were aligned with business objectives and compliance requirements.</p>
        <p>The growing prevalence of cybersecurity concerns and regulatory compliance (e.g., <abbrev xlink:title="Sarbanes-Oxley Act" id="ABBRID0ECOAC">SOx</abbrev>, GDPR) further expanded the role of IT auditors. Cyber risks, such as data breaches, malware attacks, and system vulnerabilities, became top priorities, requiring auditors to focus on network security, access controls, encryption protocols, and incident response mechanisms (<xref ref-type="bibr" rid="B5">Azizi et al. 2024</xref>). Simultaneously, regulatory bodies introduced more stringent compliance standards, making it necessary for IT auditors to ensure organizations followed legal requirements and documented and maintained audit trails for regulatory review.</p>
        <p>Regulators responded to these changes by updating standards and introducing new legislation, such as the Health Insurance Portability and Accountability Act (<abbrev xlink:title="Health Insurance Portability and Accountability Act" id="ABBRID0EMOAC">HIPAA</abbrev>) and the Gramm-Leach-Bliley Act, to address information privacy and security concerns. Professional associations like <abbrev xlink:title="Information Systems and Control Association" id="ABBRID0EQOAC">ISACA</abbrev> and <abbrev xlink:title="American Institute of Certified Public Accountants" id="ABBRID0EUOAC">AICPA</abbrev> also issued updates to frameworks and certifications, reflecting the evolving landscape of IT auditing.</p>
        <p>The second half of this era saw a significant shift in auditors’ approach due to <abbrev xlink:title="Sarbanes-Oxley Act" id="ABBRID0E1OAC">SOx</abbrev> Section 404, which required CEOs and CFOs to certify the effectiveness of internal controls over financial reporting. This led to increased attention to internal control systems and a closer relationship between executive boards and internal audit functions.</p>
        <p>The demand for IT auditors has risen as the importance of integrating IT into the audit process has become more widely recognized. Integrated auditing—an approach that merges IT and financial audits—has gained prominence, creating challenges in distinguishing between general IT controls and application-specific controls. This convergence necessitates closer collaboration between general IT personnel and specialized auditors (<xref ref-type="bibr" rid="B12">Chaney and Kim 2007</xref>; <xref ref-type="bibr" rid="B21">Helpert and Lazarine 2009</xref>). Historically, Information Technology General Controls and application controls were distinctly separate, with a primary focus on maintaining boundaries rather than integration.</p>
        <p>Professional association membership trends showed substantial growth in organizations like NOREA (NL) and <abbrev xlink:title="Information Systems and Control Association" id="ABBRID0EKPAC">ISACA</abbrev>, highlighting an increasing importance of certifications and expertise in IT auditing and control.</p>
        <p>Overall, this phase significant upheaval in the accounting and auditing profession, driven by technological advancements, regulatory changes, and a growing awareness of the importance of IT auditing and IT Security and Information Security. It set the stage for the continued evolution of the field in subsequent years.</p>
        <p>Changes in the environment have significantly affected how IT audits are done. The fast growth of technology businesses use has made IT audit jobs more extensive and complicated (<xref ref-type="bibr" rid="B19">Hass et al. 2006</xref>). Emerging technologies such as smartphones and tablets have provided businesses with innovative tools while introducing new vulnerabilities. Although ideas like SaaS have changed over the years, early versions of Application Service Providing (<abbrev xlink:title="Application Service Providing" id="ABBRID0EVPAC">ASP</abbrev>) in the 2000s helped create our current cloud services (<xref ref-type="bibr" rid="B22">Hinson 2007</xref>). IT auditors have had to adapt to new challenges. They need IT security and digital investigation skills because of rising cyber threats. This means they must be good in many different areas.</p>
        <p>Implementing the Sarbanes-Oxley Act (<abbrev xlink:title="Sarbanes-Oxley Act" id="ABBRID0EAAAE">SOx</abbrev>) led to significant changes in traditional accounting roles as organizations began adopting <abbrev xlink:title="Enterprise Resource Planning" id="ABBRID0EEAAE">ERP</abbrev> systems. This created a need for skills in IT auditing (<xref ref-type="bibr" rid="B14">Dechow and Mourtisen 2004</xref>). <abbrev xlink:title="Sarbanes-Oxley Act" id="ABBRID0EMAAE">SOx</abbrev> brought new ideas about managing rules and risks and following laws, making IT auditing more critical. Those auditors without an IT background required significant training to cope with this shift. Integrated auditing means that generalists and specialists need to work together. This has become a common practice, bringing chances and difficulties in balancing their different skills (<xref ref-type="bibr" rid="B30">Kliem 2005</xref>).</p>
        <p>Professional associations like <abbrev xlink:title="Information Systems and Control Association" id="ABBRID0EWAAE">ISACA</abbrev> and the Institute of Internal Auditors (<abbrev xlink:title="Institute of Internal Auditors" id="ABBRID0E1AAE">IIA</abbrev>) responded to the changing landscape by providing guidelines, introducing new certifications, and addressing the need for IT audit skills (<xref ref-type="bibr" rid="B25">IIA 2007</xref>; <xref ref-type="bibr" rid="B26">ISACA 2008</xref>). The introduction of Auditing Standard No. 5 by the Public Company Accounting Oversight Board (<abbrev xlink:title="Public Company Accounting Oversight Board" id="ABBRID0EGBAE">PCAOB</abbrev>) further emphasized the importance of IT controls in audits (<abbrev xlink:title="Public Company Accounting Oversight Board" id="ABBRID0EKBAE">PCAOB</abbrev> 2007).</p>
        <p>Research during this era focused on the impact of IT on internal audits, the detection of material weaknesses, and the relationship between IT integration and control deficiencies (<xref ref-type="bibr" rid="B17">Grant et al. 2008</xref>; Masli 2010; <xref ref-type="bibr" rid="B35">Lin et al. 2011</xref>; <xref ref-type="bibr" rid="B7">Bédard and Graham 2011</xref>; <xref ref-type="bibr" rid="B8">Bédard et al. 2012</xref>). These studies highlighted the critical role of IT auditing in detecting and addressing control deficiencies.</p>
        <p>During this time, it was essential for IT auditors to have skills related to technology. With the rise of outsourcing, <abbrev xlink:title="Statement of Auditing Standards" id="ABBRID0ECCAE">SAS</abbrev> 70 audits gained more significant importance for businesses. IT auditors were vital in checking the IT services provided by other companies. This change made people see IT auditors as necessary for financial audits and helping manage technology-related risks. The connection with information security and risk management gave IT auditors a more active and independent role.</p>
      </sec>
      <sec sec-type="﻿2.8. The period 2010 – present" id="SECID0EGCAE">
        <title>﻿2.8. The period 2010 – present</title>
        <p>Since 2010, quickly changing technology has changed how IT audits work, bringing new and complex challenges. New technologies like cloud computing, artificial intelligence (<abbrev xlink:title="artificial intelligence" id="ABBRID0EMCAE">AI</abbrev>), the Internet of Things (<abbrev xlink:title="Internet of Things" id="ABBRID0EQCAE">IoT</abbrev>), and machine learning offer new chances and some risks. These risks include communication problems and reliance on vendors because critical IT services are outsourced (<xref ref-type="bibr" rid="B9">Berghout and Fijneman 2023</xref>). As these new technologies change how businesses work, IT auditors need to check the risks from digital changes and the trustworthiness of outside vendors.</p>
        <p>IT auditors find themselves grappling with this constantly shifting technological landscape, which is further compounded by evolving regulatory and professional guidelines. These guidelines lack standardization and are subject to frequent revisions by organizations such as COSO, <abbrev xlink:title="Information Systems and Control Association" id="ABBRID0E1CAE">ISACA</abbrev>, and the <abbrev xlink:title="Institute of Internal Auditors" id="ABBRID0E5CAE">IIA</abbrev>. Professional associations have attempted to collaborate to address these challenges, but the practical benefits of such collaborations have been limited (<xref ref-type="bibr" rid="B18">Gray 2016</xref>).</p>
        <p>Studies have shown that technology significantly affects auditors’ work, highlighting the need to understand IT to grow in their careers (<xref ref-type="bibr" rid="B44">Omoteso et al. 2010</xref>). Continuous auditing and monitoring, which require knowledge of technology and how businesses work, have become very important. Understanding the differences between IT auditors and financial auditors shows that IT auditors need to understand internal controls and business processes to understand audit results properly (<xref ref-type="bibr" rid="B55">Stoel et al. 2012</xref>). The debate surrounding integrated IT auditing (skills) is still ongoing. While some organizations are moving towards hybrid models that enhance the IT competency of financial auditors, the integration process remains gradual (<xref ref-type="bibr" rid="B31">Kwon et al. 2012</xref>). The quality of IT audits is also an area of attention, with deficiencies in the assessment of controls being a recurring issue (<xref ref-type="bibr" rid="B20">Havelka and Merhout 2013</xref>).</p>
        <p><xref ref-type="bibr" rid="B31">Kwon et al. (2012)</xref> argued that as technology continues to evolve and regulatory demands grow, the demand for proficient IT auditors is expected to rise. The changing landscape of technology is not only influencing the direction of research, it is also sparking jurisdictional debates within professional associations. These transformations may extend beyond traditional boundaries and may impact a broader range of professional organizations.</p>
        <p>Reports from professional groups show that more people are joining IT auditing organizations. This indicates that technology is advancing and that more people understand how crucial IT auditing is. This trend suggests that more people in the professional world see IT auditing as an essential field. Many organizations now provide unique resources and certifications highlighting how established IT auditing has become as a profession. Refer to Table <xref ref-type="table" rid="T1">1</xref> for a summary of the available membership statistics, whereby the most relevant international associations are assessed on professional memberships including the most relevant ones in the Netherlands, where this study has been conducted.</p>
        <p>Table <xref ref-type="table" rid="T1">1</xref> offers a comprehensive overview of membership trends within various professional associations spanning the years 1995 to 2024. These associations, encompassing <abbrev xlink:title="Institute of Internal Auditors" id="ABBRID0EKEAE">IIA</abbrev>, <abbrev xlink:title="Information Systems and Control Association" id="ABBRID0EOEAE">ISACA</abbrev>, <abbrev xlink:title="American Institute of Certified Public Accountants" id="ABBRID0ESEAE">AICPA</abbrev>, IMA, NOREA (NL), and NBA (formerly NIVRA/NOvAA NL), represent international and national expertise. Over this timeframe, the data reveal intriguing patterns in membership evolution. In particular, the Institute of Internal Auditors (<abbrev xlink:title="Institute of Internal Auditors" id="ABBRID0EWEAE">IIA</abbrev>) exhibited a consistent upward trajectory, with membership figures steadily increasing from 60,000 in 1995 to 230,000 in 2022. Similarly, <abbrev xlink:title="Information Systems and Control Association" id="ABBRID0E1EAE">ISACA</abbrev> showcased noteworthy growth, progressing from 15,000 members in 1995 to an impressive 170,000 members by 2024. <abbrev xlink:title="American Institute of Certified Public Accountants" id="ABBRID0E5EAE">AICPA</abbrev>, a prominent professional association of certified public accountants, demonstrated a steady increase from 343,000 members in 2009 to 698,000 in 2024.</p>
        <table-wrap id="T1" position="float" orientation="portrait">
          <label>Table 1.</label>
          <caption>
            <p>Membership statistics professional organizations.</p>
          </caption>
          <table id="TID0ERMAG" rules="all">
            <tbody>
              <tr>
                <th rowspan="1" colspan="1"/>
                <th rowspan="1" colspan="1">1995</th>
                <th rowspan="1" colspan="1">2005</th>
                <th rowspan="1" colspan="1">2009</th>
                <th rowspan="1" colspan="1">2015</th>
                <th rowspan="1" colspan="1">2024</th>
              </tr>
              <tr>
                <td rowspan="1" colspan="1">
                  <abbrev xlink:title="Institute of Internal Auditors" id="ABBRID0EGGAE">IIA</abbrev>
                </td>
                <td rowspan="1" colspan="1">60,000</td>
                <td rowspan="1" colspan="1">115,000</td>
                <td rowspan="1" colspan="1">160,000</td>
                <td rowspan="1" colspan="1">182,000</td>
                <td rowspan="1" colspan="1">230,000</td>
              </tr>
              <tr>
                <td rowspan="1" colspan="1">
                  <abbrev xlink:title="Information Systems and Control Association" id="ABBRID0E5GAE">ISACA</abbrev>
                </td>
                <td rowspan="1" colspan="1">15,000</td>
                <td rowspan="1" colspan="1">60,000</td>
                <td rowspan="1" colspan="1">86,000</td>
                <td rowspan="1" colspan="1">100,000</td>
                <td rowspan="1" colspan="1">170,000</td>
              </tr>
              <tr>
                <td rowspan="1" colspan="1">
                  <abbrev xlink:title="American Institute of Certified Public Accountants" id="ABBRID0EWHAE">AICPA</abbrev>
                </td>
                <td rowspan="1" colspan="1">n/a</td>
                <td rowspan="1" colspan="1">n/a</td>
                <td rowspan="1" colspan="1">343,000</td>
                <td rowspan="1" colspan="1">394,000</td>
                <td rowspan="1" colspan="1">698,000</td>
              </tr>
              <tr>
                <td rowspan="1" colspan="1">IMA</td>
                <td rowspan="1" colspan="1">n/a</td>
                <td rowspan="1" colspan="1">n/a</td>
                <td rowspan="1" colspan="1">60,000</td>
                <td rowspan="1" colspan="1">65,000</td>
                <td rowspan="1" colspan="1">140,000</td>
              </tr>
              <tr>
                <td rowspan="1" colspan="1">NOREA (NL)</td>
                <td rowspan="1" colspan="1">± 350</td>
                <td rowspan="1" colspan="1">± 1,000</td>
                <td rowspan="1" colspan="1">1,809 (2010)</td>
                <td rowspan="1" colspan="1">1,686</td>
                <td rowspan="1" colspan="1">1,962</td>
              </tr>
              <tr>
                <td rowspan="1" colspan="1"><abbrev xlink:title="Institute of Internal Auditors" id="ABBRID0EUJAE">IIA</abbrev> (NL)</td>
                <td rowspan="1" colspan="1">Not known</td>
                <td rowspan="1" colspan="1">1.427</td>
                <td rowspan="1" colspan="1">2,353</td>
                <td rowspan="1" colspan="1">Not known</td>
                <td rowspan="1" colspan="1">2,918</td>
              </tr>
              <tr>
                <td rowspan="1" colspan="1">NBA, prior NIVRA/NOvAA (NL)</td>
                <td rowspan="1" colspan="1">13,848</td>
                <td rowspan="1" colspan="1">20,550 (2006)</td>
                <td rowspan="1" colspan="1">20,895</td>
                <td rowspan="1" colspan="1">21,290</td>
                <td rowspan="1" colspan="1">26,010 (inc trainees)</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
        <fig id="F1" position="float" orientation="portrait">
          <object-id content-type="arpha">1EDA9A91-3538-58DF-8292-D8FA2E30551A</object-id>
          <label>Figure 1.</label>
          <caption>
            <p>Graphical representation of Table <xref ref-type="table" rid="T1">1</xref>.</p>
          </caption>
          <graphic xlink:href="mab-99-073-g001.jpg" position="float" orientation="portrait" xlink:type="simple" id="oo_1315328.jpg">
            <uri content-type="original_file">https://binary.pensoft.net/fig/1315328</uri>
          </graphic>
        </fig>
        <p>In the Netherlands, the professional associations NOREA and NBA (formerly NIVRA/NOvAA NL) present an intriguing narrative. Around the year 2010, NOREA’s membership peaked at 1,809, before stabilizing, with the NBA showing a similar trend of relative constancy in its membership figures. This stabilization within the Dutch professional landscape around 2010 is particularly noteworthy, marking a point of equilibrium and maturity in these associations’ memberships. The collective data showcased in this table serve as a valuable academic resource, shedding light on the growth trajectories and noteworthy stabilization of professional membership associations, both on an international scale and in the Netherlands. This insight into the evolving composition of these associations over time contributes to a deeper understanding of their respective fields and the broader context in which they operate. In annual reports and membership meetings of the professional associations, it is being argued that the stabilization of members is due to deregistration caused by pension-related considerations.</p>
      </sec>
    </sec>
    <sec sec-type="﻿3. Conclusion" id="SECID0EMLAE">
      <title>﻿3. Conclusion</title>
      <p>The journey of IT auditing reflects a dynamic evolution from a support role for financial audits to a mature and specialized profession. The field of IT auditing has changed a lot over time. It started mainly helping with financial audits and has now developed into a specialized and essential profession. This change, caused by improvements in technology, new rules, and the rise of digital problems, has turned IT auditing into a diverse area that needs skills in security, managing risks, and understanding governance. As technology keeps improving, IT auditors will probably take on more responsibilities. Their job will become even more critical in helping organizations stay solid and responsible as they go through changes in the digital world. This development highlights that IT auditing is valuable, not just for finances, and is vital for managing risks in today’s organizations.</p>
      <p>Looking forward, the transformative trends observed over the past decades are expected to persist, propelling ongoing research and discussions within the accounting profession and professional associations. The evolution of IT auditing and control extends beyond traditional boundaries, impacting a broader range of domains and necessitating a proactive and adaptable approach by auditors, practitioners, and professional associations.</p>
      <p>The development and adaptation of IT auditing have been influenced by a multitude of interconnected factors spanning historical, technological, regulatory, and professional dimensions. The evolution of IT auditing has been shaped by the following key drivers, which have collectively contributed to the transformation and integration of IT auditing into contemporary auditing practices.</p>
      <sec sec-type="﻿Key drivers evolution of IT auditing" id="SECID0ETLAE">
        <title>﻿Key drivers evolution of IT auditing</title>
        <list list-type="roman-lower">
          <list-item>
            <p><italic>Economic transformations and financial crises</italic>: economic developments, exemplified by the recovery from the Wall Street Crash of 1929, prompted a shift in focus from fraud detection to enhancing the credibility of financial statements. The growth of business entities and the establishment of credit-granting institutions and securities markets heightened the need for accurate financial reporting and accountability. Auditors adapted to evolving economic situations and contributed to the establishment of auditing as a profession.
                    </p>
          </list-item>
          <list-item>
            <p><italic>Technological advancements</italic>: the rapid evolution of technology, particularly during the second half of the 20
                        <sup>th</sup> century and beyond, has been a crucial driver of the development of IT auditing. The widespread use of computers, the advent of electronic data processing (EDP), and subsequent technological innovations compelled auditors to adapt their methodologies and audit practices to incorporate emerging technologies. The integration of computers and technology into audit processes marked a significant shift in auditing paradigms.
                    </p>
          </list-item>
          <list-item>
            <p><italic>Regulatory reforms and compliance requirements</italic>: legislative changes, such as the Sarbanes-Oxley Act (SOx) and subsequent regulations, played a crucial role in the reshaping of IT auditing. Sox’s emphasis on internal controls over financial reporting necessitated auditors to adopt a more comprehensive and risk-based approach to auditing. Regulatory reforms highlighted the importance of IT controls and accountability, leading to the evolution of IT auditing practices.
                    </p>
          </list-item>
          <list-item>
            <p><italic>Professional associations and standardization</italic>: professional organizations such as the American Institute of Certified Public Accountants (AICPA), the Institute of Internal Auditors (IIA), ISACA including the NOREA, and the NBA in the Netherlands have all played an essential role in shaping the development of IT auditing. Associations such as these have issued frameworks, standards, and guidelines that have provided a structured approach to IT auditing practices. The development of certifications, such as the Certified Information Systems Auditor (CISA) and the RE title in the Netherlands, has contributed to the professionalization of IT auditing.
                    </p>
          </list-item>
          <list-item>
            <p><italic>Globalization and technological complexity</italic>: the increasing globalization of business operations and the proliferation of technology across industries have expanded the scope and complexity of IT auditing. Auditors are challenged to address cross-border regulatory variations and assess the risks associated with cutting-edge technologies such as cloud computing, artificial intelligence, and blockchain. These developments have prompted auditors to acquire specialized IT expertise and adapt audit methodologies accordingly.
                    </p>
          </list-item>
          <list-item>
            <p><italic>Changing business environment</italic>: the evolving nature of business models, characterized by digital transformation and the integration of technology into every aspect of business operations, has required a corresponding evolution of IT auditing. Auditors are required to assess the risks posed by technology-driven processes, data management, cybersecurity threats, and privacy concerns, reflecting the shifting business landscape.
                    </p>
          </list-item>
        </list>
        <p>In conclusion, the development and adaptation of IT auditing have been shaped by a confluence of historical, technological, regulatory, and professional factors. These interconnected factors have propelled IT auditing from its early origins as a mechanism for transaction verification to a sophisticated discipline that addresses the challenges and opportunities presented by modern technology and the ever-changing business environment. The evolution of IT auditing is a testament to dynamic interplay between historical foundations, technological innovation, regulatory imperatives, and the proactive response of auditing professionals to the demands of their times.</p>
        <boxed-text id="box1" position="float" orientation="portrait">
          <p><bold>Drs. Ing. E.S. van den Heuvel RE – Edouard</bold>, PhD Candidate, University of Amsterdam (Amsterdam Business School); Executive MSc in Auditing.</p>
        </boxed-text>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <title>﻿References</title>
      <ref id="B1">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>Abdel-Quader</surname><given-names>W</given-names></name></person-group> (<year>2022</year>) An evaluation of the international auditing standards and their application to the audit of listed corporations in Jordan. Not published doctoral thesis, University of Western Sydney, Australië.</mixed-citation>
      </ref>
      <ref id="B2">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>Amer</surname><given-names>T</given-names></name><name name-style="western"><surname>Bailey</surname><given-names>J</given-names></name><name name-style="western"><surname>De</surname><given-names>P</given-names></name></person-group> (<year>1987</year>) <article-title>A review of the computer information systems research related to accounting and auditing.</article-title><source>Journal of Information Systems</source><volume>2</volume>(<issue>1</issue>): <fpage>3</fpage>–<lpage>28</lpage>.</mixed-citation>
      </ref>
      <ref id="B3">
        <mixed-citation xlink:type="simple">American Institute of Accountants (<year>1949</year>) Internal control: Elements of a Coordinated System and Its Importance to Management and the Independent Public Accountant (5e ed.). New York.</mixed-citation>
      </ref>
      <ref id="B4">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>Armstrong</surname><given-names>P</given-names></name></person-group> (<year>1987</year>) <article-title>The rise of accounting controls in British capitalist enterprises.</article-title><source>Accounting, Organizations and Society</source><volume>12</volume>(<issue>5</issue>): <fpage>415</fpage>–<lpage>436</lpage>. <ext-link xlink:href="10.1016/0361-3682(87)90029-8" ext-link-type="doi" xlink:type="simple">https://doi.org/10.1016/0361-3682(87)90029-8</ext-link></mixed-citation>
      </ref>
      <ref id="B5">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>Azizi</surname><given-names>M</given-names></name><name name-style="western"><surname>Hakimi</surname><given-names>M</given-names></name><name name-style="western"><surname>Amiri</surname><given-names>F</given-names></name><name name-style="western"><surname>Shahidzay</surname><given-names>AK</given-names></name></person-group> (<year>2024</year>) <article-title>The role of IT (Information Technology) audit in digital transformation: Opportunities and challenges.</article-title><source>Open Access Indonesia Journal of Social Sciences</source><volume>7</volume>(<issue>2</issue>): <fpage>1473</fpage>–<lpage>1482</lpage>. <ext-link xlink:href="10.37275/oaijss.v7i2.230" ext-link-type="doi" xlink:type="simple">https://doi.org/10.37275/oaijss.v7i2.230</ext-link></mixed-citation>
      </ref>
      <ref id="B6">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>Asen</surname><given-names>A</given-names></name><name name-style="western"><surname>Bohmayr</surname><given-names>W</given-names></name><name name-style="western"><surname>Deutscher</surname><given-names>S</given-names></name><name name-style="western"><surname>González</surname><given-names>M</given-names></name><name name-style="western"><surname>Mkrtchian</surname><given-names>D</given-names></name></person-group> (<year>2019</year>) Are you spending enough on cybersecurity? Referenced from Boston Consulting Group (BCG). <ext-link xlink:href="https://www.bcg.com/publications/2019/are-you-spending-enough-cybersecurity" ext-link-type="uri" xlink:type="simple">https://www.bcg.com/publications/2019/are-you-spending-enough-cybersecurity</ext-link> [published 20-07-2022]</mixed-citation>
      </ref>
      <ref id="B7">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>Bédard</surname><given-names>J</given-names></name><name name-style="western"><surname>Graham</surname><given-names>L</given-names></name></person-group> (<year>2011</year>) <article-title>Detection and severity classifications of Sarbanes-Oxley section 404 internal control deficiencies.</article-title><source>The Accounting Review</source><volume>86</volume>(<issue>3</issue>): <fpage>825</fpage>–<lpage>855</lpage>. <ext-link xlink:href="10.2308/accr.00000036" ext-link-type="doi" xlink:type="simple">https://doi.org/10.2308/accr.00000036</ext-link></mixed-citation>
      </ref>
      <ref id="B8">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>Bédard</surname><given-names>J</given-names></name><name name-style="western"><surname>Hoitash</surname><given-names>R</given-names></name><name name-style="western"><surname>Hoitash</surname><given-names>U</given-names></name><name name-style="western"><surname>Westermann</surname><given-names>K</given-names></name></person-group> (<year>2012</year>) <article-title>Material weakness remediation and earnings quality: A detailed examination by type of control deficiency.</article-title><source>AUDITING: A Journal of Practice &amp; Theory</source><volume>31</volume>(<issue>1</issue>): <fpage>57</fpage>–<lpage>78</lpage>. <ext-link xlink:href="10.2308/ajpt-10190" ext-link-type="doi" xlink:type="simple">https://doi.org/10.2308/ajpt-10190</ext-link></mixed-citation>
      </ref>
      <ref id="B9">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>Berghout</surname><given-names>E</given-names></name><name name-style="western"><surname>Fijneman</surname><given-names>R</given-names></name></person-group> (<year>2023</year>) Auditing Complexity in Advanced Digital Auditing. IS. Spreinger, Amsterdam. <ext-link xlink:href="10.1007/978-3-031-11089-4_2" ext-link-type="doi" xlink:type="simple">https://doi.org/10.1007/978-3-031-11089-4_2</ext-link></mixed-citation>
      </ref>
      <ref id="B10">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>Brown</surname><given-names>R</given-names></name></person-group> (<year>1962</year>) <article-title>Changing audit objectives and techniques.</article-title><source>The Accounting Review</source><volume>37</volume>(<issue>4</issue>): <fpage>696</fpage>–<lpage>703</lpage>.</mixed-citation>
      </ref>
      <ref id="B11">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>Brown</surname><given-names>AL</given-names></name></person-group> (<year>1982</year>) Learning, Remembering, and Understanding. Technisch rapport nr. 244.</mixed-citation>
      </ref>
      <ref id="B12">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>Chaney</surname><given-names>C</given-names></name><name name-style="western"><surname>Kim</surname><given-names>G</given-names></name></person-group> (<year>2007</year>) <article-title>The integrated auditor.</article-title><source>The Internal Auditor</source><volume>64</volume>(<issue>4</issue>): <fpage>46</fpage>–<lpage>51</lpage>.</mixed-citation>
      </ref>
      <ref id="B13">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>Davies</surname><given-names>M</given-names></name><name name-style="western"><surname>Paterson</surname><given-names>R</given-names></name><name name-style="western"><surname>Wilson</surname><given-names>A</given-names></name></person-group> (<year>1999</year>) UK GAAP. Butterworth’s Toiley.</mixed-citation>
      </ref>
      <ref id="B14">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>Dechow</surname><given-names>N</given-names></name><name name-style="western"><surname>Mourtisen</surname><given-names>J</given-names></name></person-group> (<year>2004</year>) <article-title>Enterprise resource planning systems, management control and the quest for integration.</article-title><source>Accounting, Organizations and Society</source><volume>30</volume>(<issue>7–8</issue>): <fpage>691</fpage>–<lpage>733</lpage>. <ext-link xlink:href="10.1016/j.aos.2004.11.004" ext-link-type="doi" xlink:type="simple">https://doi.org/10.1016/j.aos.2004.11.004</ext-link></mixed-citation>
      </ref>
      <ref id="B15">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>Flint</surname><given-names>D</given-names></name></person-group> (<year>1988</year>) Philosophy and principles of auditing. Hampshire: Macmillan Education Ltd.</mixed-citation>
      </ref>
      <ref id="B16">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>Gill</surname><given-names>G</given-names></name><name name-style="western"><surname>Cosserat</surname><given-names>G</given-names></name></person-group> (<year>1996</year>) Modern auditing in Australia (4<sup>th</sup> ed.). John Wiley &amp; Sons.</mixed-citation>
      </ref>
      <ref id="B17">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>Grant</surname><given-names>G</given-names></name><name name-style="western"><surname>Miller</surname><given-names>C</given-names></name><name name-style="western"><surname>Alali</surname><given-names>F</given-names></name></person-group> (<year>2008</year>) <article-title>The effect on IT controls on financial reporting.</article-title><source>Managerial Auditing Journal</source><volume>23</volume>(<issue>8</issue>): <fpage>803</fpage>–<lpage>823</lpage>. <ext-link xlink:href="10.1108/02686900810899536" ext-link-type="doi" xlink:type="simple">https://doi.org/10.1108/02686900810899536</ext-link></mixed-citation>
      </ref>
      <ref id="B18">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>Gray</surname><given-names>JM</given-names></name></person-group> (<year>2016</year>) Information Technology Audits by Internal Auditors: Exploring the Evolution of Integrated IT Audits. Published PhD thesis, Bentley University.</mixed-citation>
      </ref>
      <ref id="B19">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>Hass</surname><given-names>S</given-names></name><name name-style="western"><surname>Abdolmohammadi</surname><given-names>MJ</given-names></name><name name-style="western"><surname>Burnaby</surname><given-names>P</given-names></name></person-group> (<year>2006</year>) <article-title>The Americas Literature Review on Internal Auditing.</article-title><source>Managerial Auditing Journal</source><volume>21</volume>(<issue>8</issue>): <fpage>835</fpage>–<lpage>844</lpage>. <ext-link xlink:href="10.1108/02686900610703778" ext-link-type="doi" xlink:type="simple">https://doi.org/10.1108/02686900610703778</ext-link></mixed-citation>
      </ref>
      <ref id="B20">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>Havelka</surname><given-names>D</given-names></name><name name-style="western"><surname>Merhout</surname><given-names>J</given-names></name></person-group> (<year>2013</year>) <article-title>Internal information technology audit process quality: Theory development using structured group processes.</article-title><source>International Journal of Accounting Information Systems</source><volume>14</volume>(<issue>3</issue>): <fpage>165</fpage>–<lpage>192</lpage>. <ext-link xlink:href="10.1016/j.accinf.2012.12.001" ext-link-type="doi" xlink:type="simple">https://doi.org/10.1016/j.accinf.2012.12.001</ext-link></mixed-citation>
      </ref>
      <ref id="B21">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>Helpert</surname><given-names>M</given-names></name><name name-style="western"><surname>Lazarine</surname><given-names>K</given-names></name></person-group> (<year>2009</year>) <article-title>Integrated auditing: An internal audit perspective.</article-title><source>Southern African Journal of Accountability and Auditing Research</source><volume>17</volume>(<issue>2</issue>): <fpage>47</fpage>–<lpage>56</lpage>.</mixed-citation>
      </ref>
      <ref id="B22">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>Hinson</surname><given-names>G</given-names></name></person-group> (<year>2007</year>) <article-title>The state of IT auditing in 2007.</article-title><source>Information Systems Management</source><volume>24</volume>(<issue>4</issue>): <fpage>339</fpage>–<lpage>345</lpage>.</mixed-citation>
      </ref>
      <ref id="B23">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>Holmes</surname><given-names>F</given-names></name></person-group> (<year>1975</year>) <article-title>Auditing from the DP manager’s viewpoint.</article-title><source>The Internal Auditor</source><volume>32</volume>(<issue>6</issue>): <fpage>29</fpage>.</mixed-citation>
      </ref>
      <ref id="B24">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>Hutchison</surname><given-names>P</given-names></name><name name-style="western"><surname>White</surname><given-names>C</given-names></name><name name-style="western"><surname>Daigle</surname><given-names>R</given-names></name></person-group> (<year>2004</year>) <article-title>Advances in accounting information systems and international journal of accounting information systems: First then volumes (1992–2003).</article-title><source>International Journal of Accounting Information Systems</source><volume>5</volume>(<issue>3</issue>): <fpage>341</fpage>–<lpage>365</lpage>. <ext-link xlink:href="10.1016/j.accinf.2004.06.002" ext-link-type="doi" xlink:type="simple">https://doi.org/10.1016/j.accinf.2004.06.002</ext-link></mixed-citation>
      </ref>
      <ref id="B25">
        <mixed-citation xlink:type="simple">IIA (<year>2007</year>) International Standards for the Professional Practice of Internal Auditing. Altamonte Springs, FL: The Institute of Internal Auditors.</mixed-citation>
      </ref>
      <ref id="B26">
        <mixed-citation xlink:type="simple">ISACA (<year>2008</year>) IT Audit and Assurance Standards. Rolling Meadows, IL: ISACA.</mixed-citation>
      </ref>
      <ref id="B27">
        <mixed-citation xlink:type="simple">ISACA (<year>2019</year>) ISACA 50 Years: An Evolving Profession. ISACA History Publication.</mixed-citation>
      </ref>
      <ref id="B28">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>Jacobs</surname><given-names>FR</given-names></name></person-group> (<year>2007</year>) <article-title>Enterprise resource planning (ERP) – A brief history.</article-title><source>Journal of Operations Management</source><volume>25</volume>(<issue>2</issue>): <fpage>357</fpage>–<lpage>363</lpage>. <ext-link xlink:href="10.1016/j.jom.2006.11.005" ext-link-type="doi" xlink:type="simple">https://doi.org/10.1016/j.jom.2006.11.005</ext-link></mixed-citation>
      </ref>
      <ref id="B29">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>Kee</surname><given-names>R</given-names></name></person-group> (<year>1993</year>) <article-title>Data processing technology and accounting: A historical perspective.</article-title><source>The Accounting Historians Journal</source><volume>20</volume>(<issue>2</issue>): <fpage>187</fpage>–<lpage>216</lpage>. <ext-link xlink:href="10.2308/0148-4184.20.2.187" ext-link-type="doi" xlink:type="simple">https://doi.org/10.2308/0148-4184.20.2.187</ext-link></mixed-citation>
      </ref>
      <ref id="B30">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>Kliem</surname><given-names>R</given-names></name></person-group> (<year>2005</year>) <article-title>What every new IT auditor should know.</article-title><source>EDPACS,</source><volume>32</volume>(<issue>8</issue>): <fpage>12</fpage>–<lpage>20</lpage>. <ext-link xlink:href="10.1201/1079/44953.32.8.20050201/86213.3" ext-link-type="doi" xlink:type="simple">https://doi.org/10.1201/1079/44953.32.8.20050201/86213.3</ext-link></mixed-citation>
      </ref>
      <ref id="B31">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>Kwon</surname><given-names>SY</given-names></name><name name-style="western"><surname>Lim</surname><given-names>YD</given-names></name><name name-style="western"><surname>Simnett</surname><given-names>R</given-names></name></person-group> (<year>2012</year>) <article-title>Mandatory audit firm rotation and audit quality: Evidence from the Korean audit market.</article-title><source>Auditing: A Journal of Practice &amp; Theory</source><volume>33</volume>(<issue>4</issue>): <fpage>167</fpage>–<lpage>196</lpage>. <ext-link xlink:href="10.2308/ajpt-50814" ext-link-type="doi" xlink:type="simple">https://doi.org/10.2308/ajpt-50814</ext-link></mixed-citation>
      </ref>
      <ref id="B32">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>Lee</surname><given-names>TA</given-names></name></person-group> (<year>1986</year>) Company Financial Reporting: A Historical and Comparative Study of the Dutch Regulatory Process. North-Holland, Amsterdam.</mixed-citation>
      </ref>
      <ref id="B33">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>Lee</surname><given-names>TA</given-names></name></person-group> (<year>1994</year>) Financial Reporting and Corporate Governance: A Historical and Comparative View. Aldershot, Avebury.</mixed-citation>
      </ref>
      <ref id="B34">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>Leung</surname><given-names>P</given-names></name><name name-style="western"><surname>Coram</surname><given-names>P</given-names></name><name name-style="western"><surname>Cooper</surname><given-names>B</given-names></name></person-group> (<year>2007</year>) Modern auditing &amp; assurance services (3<sup>rd</sup> ed.). John Wiley &amp; Sons, Australia.</mixed-citation>
      </ref>
      <ref id="B35">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>Lin</surname><given-names>S</given-names></name><name name-style="western"><surname>Pizzini</surname><given-names>M</given-names></name><name name-style="western"><surname>Vargus</surname><given-names>M</given-names></name><name name-style="western"><surname>Bardhan</surname><given-names>I</given-names></name></person-group> (<year>2011</year>) <article-title>The role of the internal audit function in the disclosure of material weaknesses.</article-title><source>The Accounting Review</source><volume>86</volume>(<issue>1</issue>): <fpage>287</fpage>–<lpage>323</lpage>. <ext-link xlink:href="10.2308/accr.00000016" ext-link-type="doi" xlink:type="simple">https://doi.org/10.2308/accr.00000016</ext-link></mixed-citation>
      </ref>
      <ref id="B36">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>Masli</surname><given-names>A</given-names></name><name name-style="western"><surname>Peters</surname><given-names>GF</given-names></name><name name-style="western"><surname>Richardson</surname><given-names>VJ</given-names></name><name name-style="western"><surname>Sanchez</surname><given-names>JM</given-names></name></person-group> (<year>2010</year>) <article-title>The effect of information technology controls on financial reporting quality.</article-title><source>Journal of Accounting and Public Policy</source><volume>29</volume>(<issue>3</issue>): <fpage>288</fpage>–<lpage>305</lpage>.</mixed-citation>
      </ref>
      <ref id="B37">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>McAfee</surname><given-names>A</given-names></name><name name-style="western"><surname>Brynjolfsson</surname><given-names>E</given-names></name></person-group> (<year>2008</year>) Investing in the IT that makes a competitive difference. Harvard Business Review 86(7/8): 98–107.</mixed-citation>
      </ref>
      <ref id="B38">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>McMickle</surname><given-names>P</given-names></name></person-group> (<year>1978</year>) The nature and objectives of auditing: A unified rationale of public, governmental and internal auditing. University of Alabama, VS.</mixed-citation>
      </ref>
      <ref id="B39">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>Miller</surname><given-names>A</given-names></name></person-group> (<year>1972</year>) <article-title>The borrowed auditor; a different approach.</article-title><source>The Internal Auditor</source><volume>29</volume>(<issue>6</issue>): <fpage>30</fpage>.</mixed-citation>
      </ref>
      <ref id="B40">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>Mock</surname><given-names>T</given-names></name><name name-style="western"><surname>Jerry</surname><given-names>L</given-names></name></person-group> (<year>1981</year>) Internal accounting control evaluation and auditor judgment; Auditing research monograph, 3. Guides, Handbooks and Manuals 11.</mixed-citation>
      </ref>
      <ref id="B41">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>Montgomery</surname><given-names>R</given-names></name></person-group> (<year>1934</year>) Auditing theory and practice (5<sup>th</sup> ed.). Ronald Press, New York.</mixed-citation>
      </ref>
      <ref id="B42">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>Montgomery</surname><given-names>R</given-names></name></person-group> (<year>1940</year>) Auditing theory and practice (6<sup>th</sup> ed.). Ronald Press, New York.</mixed-citation>
      </ref>
      <ref id="B43">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>Nguyen</surname><given-names>NP</given-names></name><name name-style="western"><surname>Hang</surname><given-names>NTT</given-names></name><name name-style="western"><surname>Hiep</surname><given-names>N</given-names></name><name name-style="western"><surname>Flynn</surname><given-names>O</given-names></name></person-group> (<year>2023</year>) <article-title>Does transformational leadership influence organisational culture and organisational performance: Empirical evidence from an emerging country.</article-title><source>IIMB Management Review</source><volume>35</volume>(<issue>4</issue>): <fpage>382</fpage>–<lpage>392</lpage>. <ext-link xlink:href="10.1016/j.iimb.2023.10.001" ext-link-type="doi" xlink:type="simple">https://doi.org/10.1016/j.iimb.2023.10.001</ext-link></mixed-citation>
      </ref>
      <ref id="B44">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>Omoteso</surname><given-names>K</given-names></name><name name-style="western"><surname>Ashok</surname><given-names>P</given-names></name><name name-style="western"><surname>Scott</surname><given-names>P</given-names></name></person-group> (<year>2010</year>) <article-title>Information and communication technology and auditing: Current implications and future directions.</article-title><source>International Journal of Auditing</source><volume>14</volume>: <fpage>147</fpage>–<lpage>162</lpage>. <ext-link xlink:href="10.1111/j.1099-1123.2009.00410.x" ext-link-type="doi" xlink:type="simple">https://doi.org/10.1111/j.1099-1123.2009.00410.x</ext-link></mixed-citation>
      </ref>
      <ref id="B45">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>Overill</surname><given-names>RE</given-names></name></person-group> (<year>1998</year>) <article-title>Trends in computer crime.</article-title><source>Journal of Financial Crime</source><volume>6</volume>(<issue>2</issue>): <fpage>157</fpage>–<lpage>162</lpage>. <ext-link xlink:href="10.1108/eb025876" ext-link-type="doi" xlink:type="simple">https://doi.org/10.1108/eb025876</ext-link></mixed-citation>
      </ref>
      <ref id="B46">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>Olagunju</surname><given-names>A</given-names></name><name name-style="western"><surname>Owolabi</surname><given-names>SA</given-names></name></person-group> (<year>2020</year>) <article-title>Historical Evolution of Audit Theory and Practice.</article-title><source>International Journal of Management Excellence</source><volume>15</volume>(<issue>3</issue>): <fpage>2139</fpage>–<lpage>2149</lpage>. <ext-link xlink:href="10.17722/ijme.v16i1.1197" ext-link-type="doi" xlink:type="simple">https://doi.org/10.17722/ijme.v16i1.1197</ext-link></mixed-citation>
      </ref>
      <ref id="B47">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>PCAOB [Public Company Accounting Oversight Board]</surname><given-names/></name></person-group> (<year>2007</year>) Auditing Standard No. 5: An Audit of Internal Control Over Financial Reporting That Is Integrated with An Audit of Financial Statements. PCAOB, Washington, D.C.</mixed-citation>
      </ref>
      <ref id="B48">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>Porter</surname><given-names>B</given-names></name><name name-style="western"><surname>Simon</surname><given-names>J</given-names></name><name name-style="western"><surname>Hatherly</surname><given-names>D</given-names></name></person-group> (<year>2005</year>) Principles of external auditing. John Wiley &amp; Sons, Ltd.</mixed-citation>
      </ref>
      <ref id="B49">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>Queenan</surname><given-names>J</given-names></name></person-group> (<year>1946</year>) <article-title>The public accountant of today and tomorrow.</article-title><source>The Accounting Review</source><volume>21</volume>(<issue>3</issue>): <fpage>254</fpage>–<lpage>260</lpage>.</mixed-citation>
      </ref>
      <ref id="B50">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>Ramamoorti</surname><given-names>S</given-names></name><name name-style="western"><surname>Weidenmier</surname><given-names>M</given-names></name></person-group> (<year>2004</year>) Chapter 9: the pervasive impact of information technology on internal auditing. [Geraadpleegd via] <ext-link xlink:href="https://na.theiia.org/iiarf/Public%20Documents/Chapter%209%20The%20Pervasive%20Impact%20of%20Information%20Technology%20on%20Internal%20Auditing.pdf" ext-link-type="uri" xlink:type="simple">https://na.theiia.org/iiarf/Public%20Documents/Chapter%209%20The%20Pervasive%20Impact%20of%20Information%20Technology%20on%20Internal%20Auditing.pdf</ext-link></mixed-citation>
      </ref>
      <ref id="B51">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>Salehi</surname><given-names>M</given-names></name></person-group> (<year>2007</year>) An empirical study of corporate audit expectation gap in Iran. University of Mysore, India.</mixed-citation>
      </ref>
      <ref id="B52">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>Samuels</surname><given-names>J</given-names></name><name name-style="western"><surname>Steinbart</surname><given-names>P</given-names></name></person-group> (<year>2002</year>) <article-title>A review of the first 15 years.</article-title><source>Journal of Information Systems</source><volume>16</volume>(<issue>2</issue>): <fpage>97</fpage>–<lpage>116</lpage>. <ext-link xlink:href="10.2308/jis.2002.16.2.97" ext-link-type="doi" xlink:type="simple">https://doi.org/10.2308/jis.2002.16.2.97</ext-link></mixed-citation>
      </ref>
      <ref id="B53">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>Seiler</surname><given-names>RE</given-names></name></person-group> (<year>1972</year>) <article-title>Our changing information technology and its impact upon the internal audit function.</article-title><source>The Internal Auditor</source><volume>29</volume>(<issue>1</issue>): <fpage>40</fpage>.</mixed-citation>
      </ref>
      <ref id="B54">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>Short</surname><given-names>F</given-names></name></person-group> (<year>1940</year>) Internal control from the viewpoint of the auditor. Journal of Accountancy.</mixed-citation>
      </ref>
      <ref id="B55">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>Stoel</surname><given-names>D</given-names></name><name name-style="western"><surname>Havelka</surname><given-names>D</given-names></name><name name-style="western"><surname>Merhout</surname><given-names>J</given-names></name></person-group> (<year>2012</year>) <article-title>An analysis of attributes that impact information technology audit quality: A study of IT and financial audit practitioners.</article-title><source>International Journal of Accounting Information Systems</source><volume>13</volume>(<issue>1</issue>): <fpage>60</fpage>–<lpage>79</lpage>. <ext-link xlink:href="10.1016/j.accinf.2011.11.001" ext-link-type="doi" xlink:type="simple">https://doi.org/10.1016/j.accinf.2011.11.001</ext-link></mixed-citation>
      </ref>
      <ref id="B56">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>Toms</surname><given-names>S</given-names></name></person-group> (<year>2019</year>) <article-title>Financial scandals: a historical overview.</article-title><source>Accounting and Business Research</source><volume>49</volume>(<issue>5</issue>): <fpage>477</fpage>–<lpage>499</lpage>. <ext-link xlink:href="10.1080/00014788.2019.1610591" ext-link-type="doi" xlink:type="simple">https://doi.org/10.1080/00014788.2019.1610591</ext-link></mixed-citation>
      </ref>
      <ref id="B57">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>Turley</surname><given-names>S</given-names></name><name name-style="western"><surname>Cooper</surname><given-names>M</given-names></name></person-group> (<year>2005</year>) Auditing in the United Kingdom. Pretice-Hall International/ICAEW. Englewood Cliffs.</mixed-citation>
      </ref>
      <ref id="B58">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>Vasarhelyi</surname><given-names>M</given-names></name><name name-style="western"><surname>Halper</surname><given-names>F</given-names></name></person-group> (<year>1991</year>) <article-title>The continuous audit of online systems.</article-title><source>Auditing: A Journal of Practice &amp; Theory</source><volume>10</volume>(<issue>1</issue>): <fpage>110</fpage>–<lpage>125</lpage>.</mixed-citation>
      </ref>
      <ref id="B59">
        <mixed-citation xlink:type="simple"><person-group><name name-style="western"><surname>Zairi</surname><given-names>M</given-names></name></person-group> (<year>1994</year>) IBM Rochester. Measuring Performance for Business Results 204–208. <ext-link xlink:href="10.1007/978-94-011-1302-1_15" ext-link-type="doi" xlink:type="simple">https://doi.org/10.1007/978-94-011-1302-1_15</ext-link></mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>
