Next Article in Journal
Weighted-Permutation Entropy Analysis of Resting State EEG from Diabetics with Amnestic Mild Cognitive Impairment
Previous Article in Journal
Interplay between Lattice Distortions, Vibrations and Phase Stability in NbMoTaW High Entropy Alloys
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Exploring the Key Risk Factors for Application of Cloud Computing in Auditing

1
Accounting School, Nanfang College of Sun Yat-sen University, Wenquan Town, Conghua, Guangzhou 510970, China
2
Department and Graduate School of Accounting, Chinese Culture University, No. 55 Hwa Kang Rd., Yang Ming Shan, Taipei 11114, Taiwan
*
Author to whom correspondence should be addressed.
Entropy 2016, 18(8), 401; https://doi.org/10.3390/e18080401
Submission received: 21 April 2016 / Revised: 30 July 2016 / Accepted: 15 August 2016 / Published: 22 August 2016

Abstract

:
In the cloud computing information technology environment, cloud computing has some advantages such as lower cost, immediate access to hardware resources, lower IT barriers to innovation, higher scalability, etc., but for the financial audit information flow and processing in the cloud system, CPA (Certified Public Accountant) firms need special considerations, for example: system problems, information security and other related issues. Auditing cloud computing applications is the future trend in the CPA firms, given this issue is an important factor for them and very few studies have been conducted to investigate this issue; hence this study seeks to explore the key risk factors for the cloud computing and audit considerations. The dimensions/perspectives of the application of cloud computing audit considerations are huge and cover many criteria/factors. These risk factors are becoming increasingly complex, and interdependent. If the dimensions could be established, the mutually influential relations of the dimensions and criteria determined, and the current execution performance established; a prioritized improvement strategy designed could be constructed to use as a reference for CPA firm management decision making; as well as provide CPA firms with a reference for build auditing cloud computing systems. Empirical results show that key risk factors to consider when using cloud computing in auditing are, in order of priority for improvement: Operations (D), Automating user provisioning (C), Technology Risk (B) and Protection system (A).

1. Introduction

Cloud computing is becoming an important tool that professional CPA (Certified Public Accountant) firms and companies are using for their auditing and accounting information needs abroad. Cloud computing users plug into the cloud to fulfill their information technology needs. Specially, cloud computing should benefit small and medium size firms most, as the “ready-to-use” concept offers them the advantages of cost-savings, efficiency and flexibility. Audit services performed by CPA firms have moved from paper to cloud computing whereby client’s financial report information is stored in cloud, and this audit process is subjected to many risk factors, such as authentication, data security and privacy, system availability, business continuity, and other legal requirements [1]. Since the application of cloud computing technology in the auditing sector is more complicated than regular auditing work in the current system, effective and security audits are more detailed using information, and have become more difficult [2]. Under such circumstances, auditors should realize the risk sources of cloud computing and create a sound auditing framework, so cloud computing audit work can go smoothly [3].
Cloud computing in auditing is thus a future trend, and several risk factors should be considered. Given the few available studies, the importance of this issue and the need for relevant literature, this study examined key risk factors that should be considered when using cloud computing in auditing. CPA firms can reference the study results when constructing their cloud computing applications. Cloud computing applications in auditing involve a huge number of dimensions and sub-factors. Prior studies of the related issues when discussing the security risks of cloud computing auditing by influential analysis mostly adopt narrative presentations [3,4,5,6]. Fewer studies in the literature adopt qualitative data and some variables of the security risk of cloud computing auditing did not have quantitative data provided by experts. Furthermore, the related variables are not independent among them so there exists an influential interrelationship (dependence and feedback). However, conventional statistical methods have some restrictions in assumptions such as the linearity, normality, and independence of security risk variables of cloud computing auditing [7]. Given that the assumptions are often inconsistent with the security risks of cloud computing auditing, the methods have intrinsic limitations in terms of effectiveness and validity.
If the dimensions and sub-factors affecting cloud computing in auditing can be constructed into a framework to determine their mutual impact, strategies for improvement can be prioritized and recommended to relevant authorities. In practice, the abovementioned risk factors are usually not mutually independent, and the dimensions and sub-factors may also be mutually influencing. To resolve the problem of mutual influence between the factors and sub-factors, this study used Multiple Attribute Decision Making (MADM), which is a methodology that simultaneously weighs multiple decision-making attributes to help decision makers prioritize program attributes and make an optimal selection when given limited viable options [8,9,10,11,12,13]. The state-of-the-art survey methods of MADM can be applied to explore the key risk factors that conflict with each other when using cloud computing in auditing. MADM procedures focus on how to select the best one among specified finite alternatives/factors [13]. Another advantage of MADM methods is that they have the capacity to analyze qualitative evaluation criteria [14]. One disadvantage of MADM techniques is the high volume of calculations for finding pairwise comparison, and it is difficult to utilize them when there are a large number of criteria/factors. These techniques need arbitrary ideal levels; however they can’t match with the subjective features of the decision makers [15]. Liou [8] asserts that the Decision Making Trial and Evaluation Laboratory, (DEMATEL) can quantify complex problems and verify their direct and indirect relationship. Chen [16] recommends the DEMATEL-based Analytic Network Process (DANP) for solving dependence problem and feedback relationship since in practice, each dimension and its sub-factors may be mutually influencing and therefore a simple relationship construct should not be used. Peng and Tzeng [12] compromised by using the VlseKriterijumska Optimizacija I Kompromisno Resenje (VIKOR) to determine the dimensionality and sub-factor performance for future reference and development.
This MADM model proposed for solving real-world application of cloud computing in the auditing problems improves upon previous models in the following ways: (1) providing an interdependency model according to DANP concepts to overcome problems of dependence and feedback among risk factors; (2) incorporating VIKOR approaches to prioritize improvements according to the basic aspiration levels, allowing the proposed technique to avoid selecting the seemingly best solution from among alternatives. Instead, all alternatives were replaced by aspiration levels obtained from VIKOR; (3) offering strategic planning models that give decision-makers multiple solutions for improvement priorities. Hence, the MADM model shifts the focus from simple ranking and selection of the most preferable alternatives to performance improvements and methods.
Therefore this study used the MADM to explore cloud computing risk factors in auditing, and through literature review and interviews with industry experts, determined the dimensions and criteria that should be considered when using cloud computing in auditing. Using the DEMATEL approach, the mutual impact of the dimensions and criteria are first determined. Then using an integration of DEMATEL and DANP, the mutually influencing factors will been weighted. Finally, using the modified VIKOR, the performance of the dimensions and criteria for cloud computing in auditing are evaluated to determine key factors for consideration when using cloud computing in auditing and to prioritize strategies for improvement. The result can serve as reference and development basis for CPA firms constructing cloud computing application in auditing. According to the abovementioned observations, the main research questions this study aims to answer are as follows:
  • Which risk factors should be considered by CPA firms when cloud computing?
  • When are these risk factors in the mutual influence and conflict and which are those are the key factors?
  • When based on domain experts’ cognition, those risk factors affect the executive performance?
The remainder of this paper is organized as follows: Section 1 briefly introduces the assessed dimensions and criteria in related literature; Section 2 discusses the analytical framework and methods for constructing the key factors for application of cloud computing in the auditing; Section 3 proposes an empirical case of an improvement plan for application of cloud computing in the auditing; Section 4 offers conclusions.

2. Related Literature

Providing quality service is a very important concern. Especially with an increasing mobile social and business environment, the demand for immediate access has become the trend. Cloud computing is not limited by time or space, and as long as CPAs have Internet connections, information can be accessed for customer inquiries regardless of location and time. Moreover, cloud computing can quickly support a diversity of application software so that during economic boom, CPA firms can continue to expand their operations while during economic downturns, their expenses are reduced to fees needed for their services [2]. Hence CPA firms can flexibly adjust to their actual operation environment since their expansion is not limited by software, and their reduction will not create capital paralysis. In addition, flexible contracts allow CPA firms to pay fees based on different needed expenses, and hence easy control of cash flow. Cloud computing service models and application risk for CPA firms are described below.
Although cloud technology offers a set of low cost, high efficiency and high expandability advantages in cloud computing, there are still unresolved problems inherent in the processing of a large quantity of electronic data [17]. For example, cloud computing system failure could result in security problems such as data loss or theft. Hence before adopting cloud computing services (SaaS, PaaS, IaaS), cloud computing information security must be considered [18]. In terms of data security, CPA firms require very high information security because the consequences of stolen or damaged customer information would be disastrous and it must therefore be highly protected.
When considering cloud computing for its internal organization, CPA firms must evaluate the flexible distribution of their existing computing resources and especially information security [19]. For example, is the remote information center secure? Is the information vulnerable to leaks? If the information shares storage with other departments or shares servers with other corporations, will it be compromised? The efficiency and availability of services must also be evaluated. For example, how efficient is the cloud computing transmission, implementation and availability? Another factor to consider is accuracy and portability. For example, how do CPA firms transfer their existing software and services to cloud service providers? How do CPA firms integrate their software with the services provided by the cloud service providers? Currently, there are detailed management standards for information security technology and management, such as the ISO27001 which delineates key indicators and requirements for hardware, software, managers, users and those with access during auditing.
The use of cloud computing for CPA firms is an inevitable trend, but the new trend poses potential risks. For CPA firms, using cloud computing services requires specialized knowledge and training. Users storing and accessing information in the virtual environment through IT technology are confronted with many risks. Therefore users must clearly understand these risks before implementation, including the legal roles and responsibilities of users and service providers, compliance with local laws and regulations, data protection, tangible security, privacy, incident response and availability [6]. To effectively implement cloud computing, proactive measures must be taken to ensure security [20]. The US National Institute of Standards and Technology (NIST) proposed the Framework for Improving Critical Infrastructure Cybersecurity and Special Publications 800 Series, which states that a network security structure should identify, protect, detect, respond and reply. Based on literature review and interviews with CPA and CPA firm IT experts, this study summarized the four dimensions and criteria for using cloud computing in auditing, as shown below.

2.1. Protection System

The cloud computing system of CPA firms should adopt established security systems for unified and complete analysis. By using various cloud computing security check systems and logs in its operations and maintenance, the detection and investigation of violations can be enhanced. To achieve data protection, a comprehensive mechanism for cloud computing log and review system should be constructed. The logs should include information such as user ID, operation date and time, operation content, and operation success. Zissis and Lekkas [21] pointed out the use of trusted subcontractors in the cloud environment and trusted encryption can ensure the confidentiality, integrity and reliability of information and communications [22]. At the same time, to protect data, attempts should also be made to resolve specific security vulnerability. Choudhury et al. [23] also indicated that a strong authentication structure can restrict access by illegal cloud servers and ensure the safety and efficiency of cloud computing. Since the distribution patterns and open structure of cloud computing render it a target of intrusion, an effective intrusion monitor and defense system are required to satisfy user needs [24,25].

2.2. Technology Risks

To implement cloud computing, CPA firms should construct a cloud computing platform since it is important to the development of cloud computing. The cloud computing platform can comprehensively analyze the risks of the cloud computing services, and objectively evaluate the information security capability of the cloud computing service platform, business continuity capability and legality of the platform and services. Since security vulnerabilities are inherent in the infrastructure, service platforms and applications, Mansfield-Devine [26] believe that implementing a vulnerability management program to determine vulnerable areas followed by a good repair mechanism [27] to eliminate the vulnerabilities can safeguard against malware attacks [28].

2.3. Automating User Provisioning

Jincui and Liqun [29] indicate that in cloud computing applications, automating user provisioning is a complex issue, and CPA firms should adopt an appropriate mode of cloud computing control and effective measures to ensure the accuracy and completeness of user activity logs. The clocks and times for all major cloud computing systems should be synchronized, interviews and operations should be recorded onto a physical recording system, and cloud computing platform logs should be promptly backed up onto designated log server or secured interface. In addition, a monitoring software should be used to ensure the consistency and completeness of the user activity log. Chen et al. [30] noted that many enterprises implement automating user provisioning to enhance security, improve efficiency, reduce costs, maintain data quality and ensure regulation compliance. Cloud computing has changed the security landscape of enterprises from internal to external networks, with increased emphasis on identification, and message and data protection [31]. Liu et al. [32] assert that basic anonymous cloud computing server verification can ensure user identity confidentiality and effective customer management.

2.4. Operations

Given the complexity and innovation in cloud services and cloud computing technology and increasing user concern with data privacy, CPA firms using cloud technology, data warehousing and data mining technology must confront the source, application, flow and protection of data, and find ways to fulfill their responsibilities and protect customer rights. Svantesson [33] indicates that the Swedish Data Protection Act dictates that data controllers must adopt appropriate technology and organization to protect personal data processing. In the cloud computing landscape for auditing, audit information is stored and accessed through Internet links, and audit evidence can only be obtained on the Internet link. Under normal circumstances, the audit information flows globally, and the data owner can neither control its flow nor control its storage location. When using cloud computing for auditing, auditors may not be able to ascertain where the audit evidence is hosted, and may not even know which country the audit information is stored in. On the other hand, audit evidence is often stored with the data of the cloud service providers and other customers in the same environment, and may result in completely unusable information or difficult information availability. Kikuchi and Hiraishi [34] propose an automatic synthesis technology for re-configuring the program to avoid undue changes. They also proposed a vulnerability recognition technology in the system configuration to increase service flexibility, reduce operator error and improve the reliability and availability of cloud services.
In this study, the risk factors for application of cloud computing in the auditing dimensions and criteria are derived from a literature review, brainstorming, CPA expert opinions, and interviews with IT department senior supervisors of CPA firms and academicians that specialize in computer auditing; and as the basis of the pre-test questionnaire. The results are shown in Table 1, including the four dimensions and 21 criteria.

3. Building a New MADM Model to Identify the Key Risk Factors for Application of Cloud Computing in the Auditing

This study uses a MADM tool characterized by multiple conflicting criteria [13,35,36]. The MADM model is developed based on the abovementioned studies, and is selected as a fitting method for the assessment of the key factors for application of cloud computing in the auditing; decision-makers can use the outcome for improving and reducing the performance gaps in each criterion. This section includes four sub-sections: First, the DEMATEL method is used to construct an influential network relation map (INRM). Secondly, this study illustrates how to derive the influential weights of DANP, as based on the total influence matrix of DEMATEL. Thirdly, the modified VIKOR method is applied to transform the performance values into the amended gap. Finally, the data collection process is introduced. The analytical framework is illustrated in Figure 1.

3.1. Building an Influential Network Relation Map by DEMATEL

The DEMATEL technique is used to construct an INRM in order to understand specific societal problems [37,38]. The DEMATEL technique can be divided into five stages. In the first stage, it calculates a system with n elements/criteria, and launches the evaluation scale using pairwise comparison of the aspects/criteria, in order to determine the degree of influence using a five-point scale ranging from 0 (no effect) to 4 (extremely influential), for pairwise comparison of perceptions/feelings by domain experts. The second stage measures the initial matrix to directly obtain influential matrix G. The third stage finds the normalized matrix Z, where the sums of at least one column or row, but not all, equal one. In the fourth stage, the total influential matrix P can be derived, and the INRM can be illustrated [12,39]. Further explanation of the DEMATEL method may be found in Appendix A.1.

3.2. Identifying the Weights by DANP

The basic ANP concepts are applied in the DEMATEL method in order to confirm the influential relationship of the criteria of DANP, which shows the relative influential weights of criteria. The ANP method is considered suitable to treat complex network relationships, which is expanded from AHP (Analytic Hierarchy Process) method by Saaty [40]. In this paper, the DEMATEL method is adopted into the ANP method to generate the un-weighted super-matrix. Therefore, this research combined the advantages of ANP and DEMATEL to solve the problems of dependence and feedback associated with the interrelations between criteria [16,41,42]. The DANP process is as shown in Appendix A.2.

3.3. Measuring the Performance by Modified VIKOR

The VIKOR method, as introduced by Opricovic [43] and developed by Opricovic and Tzeng [44], uses the concept of compromise to solve MADM problems with conflicting criteria. The best one can be selected among the alternatives, as based on the concept of a compromise solution, when handling complex decision making problems in the MADM framework. The modified VIKOR is applied here to derive the optimal alternative/criteria; for detailed steps see Appendix A.3.

3.4. Data Collection

In order to ensure effective pair-wise comparisons and good consistency, Saaty [45] suggests that there should be a limited number of factors in a single construct. The relative importance criteria were found by asking experts (a total of eight senior supervisors of IT departments of CPA firms, two CPA experts, and two academicians that specialize in computer auditing) to answer the pre-test questionnaire, selecting the important criteria (based on triangular fuzzy numbers and with a mean of eight and above). Question responses ranged from 0 to 10 with a high score meaning high importance, the results are shown in Table 2. The pre-test questionnaire results were applied and the DEMATEL, DANP and modified VIKOR methods combined and incorporated into the questionnaire design. A total of 40 interviews (a total of 20 senior supervisors of IT departments of CPA firms, 15 CPA experts, and five professors of computer auditing) have been carried out mainly for the analysis of interactions between the application of cloud computing in the auditing dimensions and criteria as well as performance.

4. Empirical Analysis

This section explains the study, which proposed improvement priorities based on questionnaire results and assessment. The empirical analysis process is shown in Figure 2.

4.1. Background and Problem Description

Cloud computing is appropriate for corporations needing mobile services and IT outsourcing, and the business programs of CPA firms are consistent with these needs [51]. For accounting and auditing, cloud technology offers the advantage of revolutionary technological development, and cloud computing allows CPA firms to purchase less new software and hardware each year. At the same time, efficiency, seamless programs and quality service are becoming increasing important for CPA firms, and cloud computing provides information access that is limited by time or space so that CPAs can access information as long as the Internet is available. The main advantages of using cloud computing are as described above, but before using cloud computing in auditing to manage client’s information, what issues should CPA firms consider and how would these issues affect client service?

4.2. Analysis of Empirical Result

4.2.1. DEMATEL Verification of the Analysis of Interactions between Dimensions and Criteria

According to the research method described in Section 3.1, the average initial direct-influence matrix G involving 15 criteria has been derived from expert interviews, and is a 15 × 15 matrix. The DEMATEL procedure were then utilized to obtain a normalized direct-influence matrix, and then carried out to obtain the total-influence matrix Z as shown in Table 3. From the understanding of the interviewed experts, there would be interactions between the 4 dimensions and 15 standards. The total-influence matrix TD for the dimension and TC for the criteria is derived, as shown in Table 3 and Table 4. The sum of influence given di − ri and received di − ri (please see Appendix A: DEMATEL step 3, Equations (3), (5) and (6)) for each dimension and criterion can be derived and shown in Table 3 and Table 5. The influential network-relationship can be visualized by drawing an INRM four dimensions and their subsystem as illustrated in Figure 3.
According to the influential relation (diri), it can be found that a “Operations (D)” (di − ri = 1.688 maximum) has the highest degree of an impact relationship that affects other dimensions directly. Otherwise, “Protection system (A)” (di − ri = −0.242 minimum) is the most vulnerable to impact.
Results of Table 3 show that the four dimensions, namely Protection system (A), Technology risks (B), Automating user provisioning (C) and Operations (D) are mutually influential. According to the influential relation (di − ri), it can be found that a “Operations (D)” (di − ri = 1.688 maximum) has the highest degree of an impact relationship that affects other dimensions directly. Otherwise, “Protection system (A)” (di − ri = −0.242 minimum) is the most vulnerable to impact.
This is further illustrated in Figure 3, indicating that influential priority can be sequenced as: “Operations (D)”_”Automating user provisioning (C)”_”Technology risks (B)”_”Protection system (A)”. When considering the improvement, the panel experts all regard “operations” first and agree the first priority for improvement should be a “Operations (D)”which can then produce an influential effect on the remaining dimensions.
For CPA firms, the most serious problem is incorrect information or cloud service system failure when using cloud computing in auditing, so when using cloud computing, information correctness and cloud service system support should be the foremost objectives for CPA firms, as the occurrence of any problem in these areas could result in auditing failure. Therefore signing a contract with cloud providers to require cloud computing system stability [53] can reduce system downtime and maintain high work efficiency and quality service [54].
In terms of criteria, Table 5 shows that 15 of the criteria are mutually influencing. Compared to other criteria, Private Laws (d1) is the most influential (di − ri = 0.429); in contrast, Authentication method and authorization system (a3) is the least influential (di − ri = −0.185). When using cloud computing in auditing, client audit information is a critical concern for CPA firms. In compliance with the governmental Personal Information Protection Act, CPA firms must properly protect client audit information, and store the information in a secure, damage and leak proof facility [55]. At the same time, the Personal Information Protection Act has also ensured that cloud computing systems are more sophisticated and audit information less vulnerable to hackers.
Furthermore, analysis of each dimension showed that in the Protection system (A) dimension, Tangible and intangible security (a1) is the most important criterion (di − ri = 0.160) whereas Authentication method and Authorization system (a3) is the least influential criterion (di − ri = −0.185). CPA firms must have hardware and software support to successfully implement cloud computing, and must ensure that their equipment are subjected to rigorous protection and monitoring to protect stored customer audit information [56]. Therefore, compared to other criteria in the Protection system dimension, the Tangible and intangible security (a1) criterion is more influential.
In the Technology risks (B) dimension, Supervisors (b2) is the most important criterion (di − ri = 0.050) whereas Segregation of duties (b3) is the least influential criterion (di − ri = −0.029). In cloud computing, CPA firms depend on a primary user to centrally manage the cloud computing, and implement a set of strict segregation of duties to prevent unauthorized users from accessing customer audit information. Without such segregation, customer audit information may be subjected to unauthorized access or leakage, and result in lawsuits that may severely jeopardize the reputation of the CPA firms. Therefore, compared to other criteria in the Technology risks (B) dimension, the Supervisors (b2) criterion is more influential.
In the Automating user provisioning (C) dimension, Periodic inspection of access (c3) is the most important criterion (di − ri = 0.052) whereas Removal of entrance (c2) is the least influential criterion (di − ri = −0.075). Cloud computing is an information technology, and when used in auditing, regular testing for damage or inadequacy is critical to ensure that the cloud computing system is updated with the latest version, secure and in compliance with SLA specification [51,57] to prevent information leak that may result in hacker damage. Therefore, compared to other criteria, the Periodic inspection of access (c3) criterion is more influential.
In the Operations (D) dimension, Privacy laws (d1) is the most important criterion (di − ri = 0.429) whereas Reliability and availability (d5) is the least influential criterion (di − ri = −0.152) for the same reason as described above. Therefore, compared to other criteria, the Privacy laws (d1) criterion is more influential.

4.2.2. Using the DANP to Determine Factor Weight

Using a combination of DEMATEL and DANP, the factor weight of each criterion is obtained. Using Equations (A10), (A11) and (A12), the DEMATEL Total influence-relation matrix is used to construct the un-weighted super-matrix, as shown in Table 6. Using Equations (A8), (A14) and (A15), and the weighted super-matrix for each dimension is obtained, as shown in Table 7. Finally, the limit super-matrix is used to obtain the global weights of the elements, as shown in Table 8. The results are applied to the modified VIKOR method to determine each criterion performance.

4.2.3. Implementation Performance of each Dimension and Standard

The modified VIKOR method is used to evaluate the overall performance gap of key factors in cloud computing in auditing. Based on the 40 experts assessment, this study ranked the criterion performance items in the cloud computing auditing on a score of 1 to 10, with 1 being the lowest score and 10 the highest score, and a higher score representing better performance. Each criterion score and the total average gap ( S k = j = 1 n w j r j k ) is obtained using the DANP global weights multiplied by the gap (rjk). As shown in Table 9, the average performance value is calculated from all the values of the criteria performance and their corresponding gaps ( r j k = | f j a s p i r e f j k | | f j a s p i r e f j k | ) . Based on these performance values, decision makers can identify the performance value of each dimension and criterion. The results showed that compared to other dimensions, Automating user provisioning (C) had a highest performance value of 7.899 and Technology risks (B) had a lowest value of 7.440. The overall average performance value is 7.607, which is 0.239 less than the expected optimal value (10), indicating a 23.9% gap from the optimal standard.

4.3. Management Implication

Figure 3 illustrates the causal relationship between the dimensions and criteria in this study. Through the INRM, the order of priority for improving key factors in cloud computing in auditing is: Operations (D), Automating user provisioning (C), Technology Risks (B), and Protection system (A). The results indicate that compared to other dimensions, Operations (D) is the most influential. Unlike laptops which are easily misplaced, CPA firms using cloud computing to store audit information can reduce the risk of losing information and increase audit information security [58]. At the same time, CPA firms are obliged to ensure the security and confidentiality of customer information, and to fulfill their commitment to customer information security, they must exercise more caution when using cloud computing. Hence in the Operations (D) dimension, the most important element is compliance with Personal Information Protection Act, followed by information log of incorrect audit information, cloud service system error or any other errors. The system is then updated according to prioritized log content to reduce time cost due to operating system delays. Therefore, in the abovementioned interview, experts perceived Operation as the most influential.
When considering only the single dimension of Operations (D) for improving cloud computing in auditing, the following criteria prioritization is recommended: (d1) _ (d3) _ (d2) _ (d4) _ (d5); when considering only criteria (d2), (d3), (d4), (d5) in this dimension, recommended prioritization is (d3) _ (d2) _ (d4) _ (d5). For other dimensions, improvement prioritization for corresponding criteria is shown in Table 10. In addition, as shown in Table 9, the performance values overall have an average of 7.607, with 10 as the desired level. The average gap, indicating room for improvement, is 0.239 (this is the distance from 1.0).

5. Conclusions

This study proposed Taiwan CPA firms for application of cloud computing in auditing as an empirical case to demonstrate that the MADM method could overcome the defects of the conventional MCDM method. First, the traditional model assumes that the criteria are independent and hierarchical in structure; however, real-world cloud computing in the auditing area frequently involves interdependent perspectives and criteria, decision problems are frequently characterized by interdependence criteria and dimensions and may even exhibit feedback-like effects. This study presented a MADM method that applies the characteristics of influential weights ANP and DEMATEL (DANP) to solve interdependence and feedback problems of cloud computing in the auditing risk criteria. Second, the VIKOR method set the aspired values as the aspiration level and the worst values as the tolerable level for all criterion functions, this enables a decision maker to reduce the gaps in alternatives to reach the aspiration levels. Third, the MADM method shifts the concept from the “ranking” or “selection” of the most preferable alternatives to the “improvement” of their performances to achieve the aspiration level based on INRM using the DEMATEL method. The INRM identifies how and in which directions the cloud computing risk factors influence each other, which helps decision maker to understand the root causes of performance issues and devise strategies for improvement.
Cloud computing is a ready-to-use technology [2] that allows CPA firms to reduce costs and the inconvenience of paper audits and storage. It also offers the advantages of efficiency, mobility and flexibility. However, potential risks must be considered. Although cloud computing service providers have strengthened security controls to prevent hacking, CPA firms must exercise precaution to prevent confidential information damage or loss. Hence based on literature review and a summary of expert recommendations for CPA firms when using cloud computing in auditing, this study constructed an assessment framework for cloud computing in auditing. The DEMATEL is used to construct a network diagram showing the influential relationship between the dimensions and criteria of cloud computing in auditing. The DANP is then used to analyze the weightings. Last, the modified VIKOR is used to examine the performance of cloud computing in auditing, and the DEMATEL is used to prioritize improvement strategies. Risk key factors and improvement strategies are recommended for CPA firms when using cloud computing for auditing.
The sequence of influence priorities was as follows: Operations (D), Automating user provisioning (C), Technology risks (B) and Protection system (A). The average gap between the actual and desired levels of the application and implementation of cloud computing in the auditing was 0.239, denoting the level that current Taiwan’s CPA firms cloud computing implementation needs to reach. The implications of these results for management and improvement plans have been raised and formulated to help CPA firms effectively provide professional services and enjoy the advantages of cloud computing, thereby enhancing their reputation and quality and quantity of economic benefits.
However, there are some limitations. First, this study was conducted with relatively expert sample groups. A larger sample that brought more explanatory power would have allowed more sophisticated evaluation analysis. Second, the criteria used in this research design are key criteria obtained through the integration of literature review and summary of expert interviews. Future studies can use other methods such as longitudinal studies and in-depth interviews to obtain the criteria, and examine the advantages and disadvantages compared to this study.

Acknowledgments

The authors thank the financial support from the Ministry of Science and Technology, Taiwan, under the Project No. NSC- 104-2410-H-034-004.

Author Contributions

Kuang-Hua Hu and Fu-Hsiang Chen drafted the manuscript. Wei-Jhou We performed the experiments, Kuang-Hua Hu and Fu-Hsiang Chen participated in the design of the study and performed the statistical analysis. Fu-Hsiang Chen coordination and helped to draft the manuscript. All authors read and approved the final manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A. A novel hybrid MADM model combined with DEMATEL, ANP, and modified VIKOR

Appendix A.1. Building an Influential Network Relation Map by DEMATEL

The DEMATEL technique was developed for the purpose of showing a network relation diagram, and a structural model for understanding specific societal problems. These basic concepts were used to create a series of new hybrid MADM models for solving complex and dynamic real world problems [32,33,59,60]. The DEMATEL technique involves three steps, detailed as follows:
Step 1:
Calculate the direct influence-relation average matrix G. Assume the number of experts F and the number of criteria n are asked to propose that the pairwise comparisons between any two criteria are denoted by, and are given, an integer score of 0, 1, 2, 3, or 4, expressing the range from “absolutely no influence (0)” to “very high influence (4)” by natural language in linguistics (e.g., semantics), and showing the degree that each criterion i affects each criterion j. The answers by each expert form a n × n non-negative matrix X p = [ x i j p ] n × n , p = 1 , 2 , ... , P , where X 1 , ... , X p , ... , X P are the answer matrices by the P experts in practical experience, and the elements of X p are denoted by x i j p from expert p. Thus, an n × n average matrix P of all experts given can be built by Equation (A1):
G = [ g 11 g 12 g 1 n g 21 g 22 g 2 n g n 1 g n 2 g n n ]
The average scores of the P experts are g i j = 1 P f = 1 P x i j p . The average matrix is called the initial direct relation matrix G, and represents the degree of influence one criterion exerts on another, as well as the degree of influence it receives from other criteria.
Step 2:
Normalize the initial direct-influence relation matrix. The normalized initial direct influence relation matrix Z is acquired by normalizing the average matrix G. The matrix Z is easily derived from Equations (A2) and (A3), whereby all principal diagonal criteria are equal to zero:
Z = s G
s = min { 1 max 1 i n j = 1 n g i j , 1 max 1 j n i = 1 n g i j }
Step 3:
Derive the total influence-relation matrix. A continuous decrease of the indirect effects of problems moves with the powers of the matrix Z, e.g., Z 2 , Z 3 , , Z , and lim k Z k = [ 0 ] n × n , for lim k ( I + Z + Z 2 + + Z k ) = ( I Z ) 1 , where I is a n × n unit matrix. The total influence relation matrix P is a n × n matrix, and is defined by P = [ t i j ] n × n , i , j = 1 , 2 , , n as shown in Equation (A4):
P = Z + Z 2 + ... + Z k = Z ( I + Z 2 + ... + Z k 1 ) = Z ( I + Z 2 + ... + Z k 1 ) ( I Z ) ( I Z ) 1 = Z ( I Z ) 1 ,  when  lim k Z k = [ 0 ] n × n
The total influence relation matrix P of INRM can be acquired by Equation (A4). Equations (A5) and (A6) are used to generate each row sum and column sum in the matrix P, respectively:
d = ( d i ) n × 1 = [ j = 1 n t i j ] n × 1 = ( d 1 , ... , d i , ... , d n )
r = ( r j ) n × 1 = ( r j ) 1 × n = [ i = 1 n t i j ] 1 × n = ( r 1 , ... , r j , ... , r n )
where di is the sum of a row in the total influence relation matrix P, which represents the total effects (both direct and indirect) of criterion/perspective i on the all other criteria/perspectives [ j = 1 n t i j ] n × 1 . Similarly, rj is the column sum in the total influence relation matrix P, which represents the total effects (both direct and indirect) of criterion/perspective j received from the all other criteria/perspectives [ i = 1 n t i j ] 1 × n . Thus, when i = j, ( d i + r i ) offers an index of the strength of the total influences given and received, that is ( d i + r i ) indicates the degree of importance that criterion/perspective i plays in the system. In addition, ( d i r i ) provides an index of the degree of the cause of total influence. If ( d i r i ) is positive, then criterion/perspective i is a net causer, and if ( d i r i ) is negative, then criterion/perspective i is a net receiver.

Appendix A.2. Based on the DEMATEL Technique to Find the Influential Weights of DANP

The traditional ANP solved problems with interdependence and feedback only on perspectives (dimensions) and criteria until becoming/assuming independence. Therefore, these basic ANP concepts [35] are used as a base, and are combined with DEMATEL to solve these issues. Thus, the influential weights of DANP (DEMATEL–based ANP) contain the following steps:
Step 4:
Find the normalized total influence relation matrix Pc. DEMATEL is used to build total influence relation matrix from each perspective (dimension or cluster), with different degrees of influence relation for the criteria, as shown in Equation (A7):
P C = D 1 D i D n c 11 c 12 c 1 m 1 c i 1 c i 2 c i m i c n 1 c n 2 c n m n [ P C 11 P C 1 j P C 1 n P C i 1 P C i j P C i n P C n 1 P C n j P C n n ] c 11 c 1 m 1 c i 1 c i m i   c n 1 c n m n D 1 D i D n
where D n is the nth cluster; c n m is the mth criterion in the nth dimension; and P C i j is a submatrix of the influence relation by the criteria from a comparison of the ith dimension and the jth dimension. In addition, if the ith dimension has no influence on the jth dimension, then submatrix P C i j = [ 0 ] , shows independence (no influence relation) in each other criterion.
Step 5:
Form an un-weighted super-matrix W . Normalize the total influence relation matrix P C as shown in Equation (A8):
P C α = D 1 D i D n c 11 c 12 c 1 m 1 c i 1 c i 2 c i m i c n 1 c n 2 c n m n [ P C α 11 P C α 1 j P C α 1 n P C α i 1 P C α i j P C α i n P C α n 1 P C α n j P C α n n ] D 1   D j   D n c 11 c 1 m 1   c j 1 c j m j c n 1 c n m n
where P C α denotes the normalizing total influence relation matrix, and P c α 12 is derived from Equations (A9) and (A10). Similarly, P c α n n can be obtained:
P i 12 = j = 1 m 2 P c i j 12 , i = 1 , 2 , , m 1
P c α 12 = [ p 11 12 / p 1 12 p 1 j 12 / p 1 12 p 1 m 2 12 / p 1 12 p i 1 12 / p i 12 p i j 12 / p i 12 p i m 2 12 / p i 12 p m 1 1 12 / p m 1 12 p m 1 j 12 / p m 1 12 p m 1 m 2 12 / p m 1 12 ] = [ p 11 α 12 p 1 j α 12 p 1 m 2 α 12 p i 1 α 12 p i j α 12 p i m 2 α 12 p m 1 1 α 12 p m 1 j α 12 p m 1 m 2 α 12 ]
According to the pair-wise comparisons with the criteria, and based on the basic concept of ANP, the un-weighted super-matrix W can be obtained by transposing the normalized influence-relation matrix P C α by dimensions (clusters), i.e., W = ( P C α ) , as shown in Equation (A11):
W = ( P C α ) = D 1 D j D n c 11 c 12 c 1 m 1 c j 1 c j 2 c j m j c n 1 c n 2 c n m n [ W 11 W i 1 W n 1 W 1 j W i j W n j W 1 n W i n W n n ] D 1   D i   D n c 11 c 1 m 1 c i 1 c i m i c n 1 c n m n
Step 6:
Obtain the weighted super-matrix W α . The total influence-relation matrix P D of dimensions is derived according to the DEMATEL technique, as given by Equation (A12):
P D = [ p D 11 p D 1 j p D 1 n p D i 1 p D i j p D i n p D n 1 p D n j p D n n ]
The normalized total influence-relation matrix P D α of dimensions can be obtained through the total influence-relation matrix P D divided by j = 1 n p i j = p i , i = 1 , 2 , , n . , as shown in Equation (A13):
P D α = [ p D 11 / p 1 p D 1 j / p 1 p D 1 n / p 1 p D i 1 / p i p D i j / p i p D i n / p i p D n 1 / p n p D n j / p n p D n m / p n ] = [ p D α 11 p D α 1 j p D α 1 n p D α i 1 p D α i j p D α i n p D α n 1 p D α n j p D α n n ]
The normalized P D α and the un-weighted super-matrix W (shown as Equation (A11)), and the weighted super-matrix W α (normalized super-matrix) can be easily obtained by Equation (A14):
W α = P D α × W = [ p D α 11 × W 11 p D α i 1 × W i 1 p D α n 1 × W n 1 p D α 1 j × W 1 j p D α i j × W i j p D α n j × W n j p D α 1 n × W 1 n p D α i n × W i n p D α n n × W n n ]
Step 7:
Find the limit super-matrix W α . Limit the weighted super-matrix by raising it to the kth power, until the super-matrix has converged and become a stable super-matrix. The global priority vectors are obtained, which are called the influential weights of DANP (DEMATEL-based ANP), such as lim k ( W α ) k , where z represents any number of power.
In brief, according to the above process, the INRM and the influence weights of DANP can be obtained. Both the above (INRM and DANP) can be used to cope with the problem of interdependence and feedback in order to innovate/create the best systematic improvement strategies to reduce the gaps of criteria performance, in order that all criteria can achieve the aspiration level.

Appendix A.3. Measuring the Performance by Modified VIKOR

The VIKOR method, as developed by Opricovic and Tzeng [44], solves MADM problems with conflicting criteria. The concept of compromise is used for evaluation of the criteria for the different projects/alternatives in competition. It is based on the basic concept of the positive-ideal solution (or the aspiration level) and negative-ideal solution (or the worst level). The modified VIKOR method is, as follows:
Step 1:
Determine the positive-ideal solution and negative-ideal solution replaced by the aspiration levels and the worst value to fit today’s real world situation. Define the best value (aspiration level) shown as f j a s p i r e in j criterion and the worst value f j w o r s t for all criteria, which can be acquired from the traditional form to the modified form.
(1)
Traditional approach for deriving the positive-ideal solution and negative-ideal solution as follows:
The positive-ideal solution: f = ( f 1 , ... , f j , ... , f n ) , where f j = max k   { f k j | k = 1 , 2 , ... , m } ;
The negative-ideal solution: f = ( f 1 , ... , f j , ... , f n ) , where f j = min k   { f k j | k = 1 , 2 , ... , m } .
(2)
The modified approach for replacement by the aspiration level and the worst value, as follows:
The aspiration level: f a s p i r e = ( f 1 a s p i r e , ... , f j a s p i r e , ... , f n a s p i r e ) , where f j a s p i r e is an aspiration level; The worst values: f w o r s t = ( f 1 w o r s t , ... , f j w o r s t , ... , f n w o r s t ) , where f j w o r s t is a worst value.
In this study, the performance range-scores from 0 to 10 (very bad ← 0,1,2,..,9,10 → very good) are used with natural language in the linguistic/semantic questionnaire, thus, the aspiration level takes the highest score of 10 and the worst value takes the value of 0. Hence, f j a s p i r e = 10 is defined as the aspiration level and f j w o r s t = 0 as the worst value, it can avoid choosing the best among inferior choices/options/alternatives. In other words, it avoids “picking the best apple from a barrel of rotten apples”.
Step 2:
Calculate the mean group utility S k for the gap and maximal gap Q k for prioritizing improvement. These values can be calculated using Equations (A15) and (A16), respectively:
S k = j = 1 n w j r k j = j = 1 n w j ( | f j a s p i r e f k j | ) / ( | f j a s p i r e f j w o r s t | )
Q k = max j { ( | f j a s p i r e f k j | ) / ( | f j a s p i r e f j w o r s t | ) | j = 1 , 2 , ... , n }
where S k is defined as the normalized ratio of distance to the aspiration level, which implies the synthesized gap for the criteria. On the other hand, Q k is defined as the normalized ratio of distance to the worst value, which implies the maximal gap in j criteria for priority improvement. Here, w j indicates the influential weights for the criteria obtained from DANP, and r k j indicates the normalized gap of the distance to the aspiration level.
Step 3:
Obtain the comprehensive indicator R k for ranking and selection in the traditional VIKOR approach. The values are given by:
R k = v ( S k S * ) / ( S S * ) + ( 1 v ) ( Q k Q * ) / ( Q Q * )
where S * = min k S k , S = max k S k , Q * = min k Q k , Q = max k Q k and 0 ν 1 , where v denotes the weight on the strategy of the maximum group utility, and 1-v is the weight on the individual regret (maximal gap for priority improvement). Therefore, Equation (A17) can be rewritten as R k = v S k + ( 1 v ) Q k in the modified VIKOR to replace the traditional VIKOR approach, when S * = S a s p i r e = 0 and Q * = Q a s p i r e = 0 as well as S = S w o r s t = 1 and Q = Q w o r s t = 1 are set. If v = 1 represents only the consideration of the average gap weighting integration, then v = 0 can be regarded as the maximum gap regarding the improvement priority. Generally speaking, v = 0.5 can be set, but can be adjusted depending on expert opinion in the value integration.

References

  1. Raval, V. Risk landscape of cloud computing. ISACA J. 2010, 1, 26. [Google Scholar]
  2. Du, H.; Cong, Y. Cloud computing, accounting, auditing, and beyond. CPA J. 2010, 80, 66–70. [Google Scholar]
  3. Fraser, S. The Risk Based Audit Process. Available online: http://www.charteredaccountants.com.au/ News-Media/Charter/Charter-articles/Audit-and-assurance/2011–07-The-Risk-Based-Audit-Approach.aspx2012 (accessed on 19 August 2016).
  4. Robson, K.; Humphrey, C.; Khalifa, R.; Jones, J. Transforming audit technologies: Business risk and the audit field. Account. Organ. Soc. 2007, 32, 409–438. [Google Scholar] [CrossRef]
  5. ISACA, ISACA Issues Four New Audit Programs on Cloud Computing, Crisis Management, Security and Active Directory. Available online: http://www.isaca.org/About-ISACA/Press-room/News-Releases/2010/Pages/ISACA-Issues-Four-New-Audit-Programson-Cloud-Computing-Crisis-Management-Security-and-Active-Directory.aspx2010 (accessed on 18 August 2015).
  6. Chou, D.C. Cloud computing risk and audit issues. Comput. Stand. Interfaces 2015, 42, 137–142. [Google Scholar] [CrossRef]
  7. Sookhak, M.; Talebian, H.; Ahmed, E.; Gani, A.; Khan, M.K. A review on remote data auditing in single cloud server: Taxonomy and open issues. J. Netw. Comput. Appl. 2014, 43, 121–141. [Google Scholar] [CrossRef]
  8. Liou, J.J.H. New concepts and trends of MCDM for tomorrow-in honor of Professor Gwo-Hshiung Tzeng on the occasion of his 70th birthday. Technol. Econ. Dev. Econ. 2013, 19, 367–375. [Google Scholar] [CrossRef]
  9. Liou, J.J.H.; Tzeng, G.H. Comments on “Multiple criteria decision making (MCDM) methods in economics: An overview”. Technol. Econ. Dev. Econ. 2012, 18, 672–695. [Google Scholar] [CrossRef]
  10. Liou, J.J.H.; Tamošaitienė, J.; Zavadskas, E.K.; Tzeng, G.H. New hybrid COPRAS-G MADM model for improving and selecting suppliers in green supply chain management. Int. J. Prod. Res. 2016, 54, 114–134. [Google Scholar] [CrossRef]
  11. Ondrus, J.; Pigneur, Y. Near field communication: An assessment for future payment systems. Inf. Syst. E-Bus. Manag. 2009, 7, 347–361. [Google Scholar] [CrossRef]
  12. Peng, K.H.; Tzeng, G.H. A hybrid dynamic MADM model for problems-improvement in economics and business. Technol. Econ. Dev. Econ. 2013, 19, 638–660. [Google Scholar] [CrossRef]
  13. Hwang, C.L.; Yoon, K. Multiple Attribute Decision Making: Methods and Applications a State-of-the-Art Survey; Springer Science & Business Media: New York, NY, USA, 2012. [Google Scholar]
  14. Bozbura, F.T.; Beskese, A.; Kahraman, C. Prioritization of human capital measurement indicators using fuzzy AHP. Expert Syst. Appl. 2007, 32, 1100–1112. [Google Scholar] [CrossRef]
  15. Asgari, M.; Abbasi, A. Comparing MADM and artificial neural network methods for evaluating suppliers in multiple sourcing decision. Decis. Sci. Lett. 2015, 4, 193–202. [Google Scholar] [CrossRef]
  16. Chen, F.H. Application of a hybrid dynamic MCDM to explore the key factors for the internal control of procurement circulation. Int. J. Prod. Res. 2015, 53, 2951–2969. [Google Scholar] [CrossRef]
  17. Li, X.; Wang, Y.; Chen, X. Cold chain logistics system based on cloud computing. Concurr. Comput. Pract Exp. 2012, 24, 2138–2150. [Google Scholar] [CrossRef]
  18. Chen, Z.; Yoon, J. IT Auditing to assure a secure cloud computing. In Proceedings of the 2010 IEEE 6th World Congress on Services, Miami, FL, USA, 5–10 July 2010.
  19. Zhu, Y.; Hu, H.; Ahn, G.J.; Yau, S.S. Efficient audit service outsourcing for data integrity in clouds. J. Syst. Softw. 2012, 85, 1083–1095. [Google Scholar] [CrossRef]
  20. Lori, M. Data security in the world of cloud computing. IEEE Secur. Priv. 2009, 7, 61–64. [Google Scholar]
  21. Zissis, D.; Lekkas, D. Addressing cloud computing security issues. Future Gener. Comput. Syst. 2012, 28, 583–592. [Google Scholar] [CrossRef]
  22. Kim, S.H.; Lee, I.Y. Block access token renewal scheme based on secret sharing in apache hadoop. Entropy 2014, 16, 4185–4198. [Google Scholar] [CrossRef]
  23. Choudhury, A.J.; Kumar, P.; Sain, M.; Lim, H.; Jae-Lee, H. A strong user authentication framework for cloud computing. In Proceedings of the 2011 IEEE Asia-Pacific Services Computing Conference (APSCC), Jeju, Korea, 12–15 December 2011; pp. 110–115.
  24. Khorshed, M.T.; Ali, A.B.M.S.; Wasimi, S.A. A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. Future Gener. Comput. Syst. 2012, 28, 833–851. [Google Scholar] [CrossRef]
  25. Patel, A.; Taghavi, M.; Bakhtiyari, K.; Júnior, J.C. An intrusion detection and prevention system in cloud computing: A systematic review. J. Netw. Comput. Appl. 2013, 36, 25–41. [Google Scholar] [CrossRef]
  26. Mansfield-Devine, S. A patchy response: The dangers of not keeping our systems secure. Comput. Fraud Secur. 2015, 2015, 15–20. [Google Scholar] [CrossRef]
  27. Rasheed, H. Auditing for standards compliance in the cloud: Challenges and directions. In Proceedings of the 2011 international Arab conference on information technology (ACIT 2011), Riyadh, Saudi Arabia, 10–13 December 2011.
  28. Albanese, M.; Jajodia, S.; Jhawar, R.; Piuri, V. Securing mission-centric operations in the cloud. In Secure Cloud Computing; Springer: New York, NY, USA, 2014; pp. 239–259. [Google Scholar]
  29. Jincui, C.; Liqun, J. Role-based access control model of cloud computing. Energy Procedia 2011, 13, 1056–1061. [Google Scholar]
  30. Chen, J.; Wu, G.; Shen, L.; Ji, Z. Differentiated security levels for personal identifiable information in identity management system. Expert Syst. Appl. 2011, 38, 14156–14162. [Google Scholar] [CrossRef]
  31. Goode, J. The importance of identity security. Comput. Fraud Secur. 2012, 2012, 5–7. [Google Scholar] [CrossRef]
  32. Liu, Z.; Yan, H.; Li, Z. Server-aided anonymous attribute-based authentication in cloud computing. Future Gener. Comput. Syst. 2015, 52, 61–66. [Google Scholar] [CrossRef]
  33. Svantesson, D.J.B. Data protection in cloud computing—The Swedish perspective. Comput. Law Secur. Rev. 2012, 28, 476–480. [Google Scholar] [CrossRef]
  34. Kikuchi, S.; Hiraishi, K. Improving reliability in management of cloud computing infrastructure by formal methods. In Proceedings of the 2014 IEEE Network Operations and Management Symposium (NOMS), Krakow, Poland, 5–9 May 2014.
  35. Hwang, C.L.; Yoon, K.S. Multiple Attribute Decision Making: Method and Applications; Springer-Verlag: New York, NY, USA, 1981. [Google Scholar]
  36. Yoon, K.P.; Hwang, C.L. Multiple Attribute Decision Making: An Introduction; Sage Publications: Thousand Oaks, CA, USA, 1995. [Google Scholar]
  37. Cebi, S. A quality evaluation model for the design quality of online shopping websites. Electron. Commer. Res. Appl. 2013, 12, 124–135. [Google Scholar] [CrossRef]
  38. Keramati, A.; Shapouri, F. Multidimensional appraisal of customer relationship management: Integrating balanced scorecard and multi criteria decision making approaches. Inf. Syst. E-Bus. Manag. 2016, 14, 217–251. [Google Scholar] [CrossRef]
  39. Chen, F.H.; Chi, D.J. Application of a new DEMATEL to explore key factors of China’s corporate social responsibility: Evidence from accounting experts. Qual. Quant. 2015, 49, 135–154. [Google Scholar] [CrossRef]
  40. Saaty, T.L. Decision Making with Dependence and Feedback: The Analytic Network Process: The Organization and Prioritization of Complexity; RWS Publications: Pittsburgh, PA, USA, 1996. [Google Scholar]
  41. Chen, F.H.; Tzeng, G.H.; Chang, C.C. Evaluating the enhancement of corporate social responsibility websites quality based on a new hybrid MADM model. Int. J. Inf. Technol. Decis. Mak. 2015, 14, 697–724. [Google Scholar] [CrossRef]
  42. Lee, W.H.; Hwang, K.P.; Lin, W.J.; Shieh, J.L. An analysis of trusted service manager development modes by mobile operating system designers in Taiwan. Electron. Commer. Res. Appl. 2015, 14, 592–602. [Google Scholar] [CrossRef]
  43. Opricovic, S. Multicriteria Optimization of Civil Engineering Systems. Fac. Civ. Eng. Belgrade 1998, 2, 5–21. [Google Scholar]
  44. Opricovic, S.; Tzeng, G.H. Extended VIKOR method in comparison with outranking methods. Eur. J. Oper. Res. 2007, 178, 514–529. [Google Scholar] [CrossRef]
  45. Saaty, T.L. The Analytic Hierarchy Process; McGraw-Hill: New York, NY, USA, 1980. [Google Scholar]
  46. Li, H.; King, G.; Ross, M.; Staples, G. BS7799: A suitable model for information security management. In Proceedings of the Americas Conference on Information Systems (AMCIS), California, CA, USA, 13–15 August 2000.
  47. Calder, A. ISO27001/ISO27002: A Pocket Guide; IT Governance: Cambridgeshire, UK, 2013. [Google Scholar]
  48. Ruan, K.; Carthy, J. Cloud computing reference architecture and its forensic implications: A preliminary analysis. In Digital Forensics and Cyber Crime; Springer: Berlin/Heidelberg, Germany, 2013; pp. 1–21. [Google Scholar]
  49. Pearson, S. Taking account of privacy when designing cloud computing services. In Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing; IEEE Computer Society: Washington, DC, USA, 2009; pp. 44–52. [Google Scholar]
  50. Scarfone, K. Guide to Security for Full Virtualization Technologies; DIANE Publishing: Collingdale, PA, USA, 2011. [Google Scholar]
  51. Kepczyk, R.H. Remote access cloud hosting options for CPA firms. CPA Pract. Manag. Forum 2011, 7, 10–13. [Google Scholar]
  52. Wu, L.; Buyya, R. Service Level Agreement (SLA) in Utility Computing Systems; IGI Global: Hershey, PA, USA, 2010. [Google Scholar]
  53. Cloud computing security considerations, Intelligence and security. Australian Government Department of Defence. Available online: http://www.asd.gov.au/publications/protect/cloud_computing_security_considerations.htm (accessed on 18 August 2016).
  54. Allen, M.J. Cloud computing heavenly solution or pie in the sky? Pa. CPA J. 2011, 82, 1–4. [Google Scholar]
  55. Badger, L.; Grance, T.; Patt-Corner, R.; Voas, J. Draft Cloud Computing Synopsis and Recommendations; NIST special publication: Washington, DC, USA, 2011. [Google Scholar]
  56. Hogan, M.; Liu, F.; Sokol, A.; Tong, J. Nist Cloud Computing Standards Roadmap; NIST Special Publication: Gaithersburg, MD, USA, 2011. [Google Scholar]
  57. Pan, L.; Wang, D. A cross-entropy-based admission control optimization approach for heterogeneous virtual machine placement in public clouds. Entropy 2016, 18, 95. [Google Scholar] [CrossRef]
  58. Duffy, H. How “cloud-ready” is your firm? CPA Pract. Manag. Forum 2012, 8, 5–6. [Google Scholar]
  59. Lu, M.T.; Hu, S.K.; Huang, L.H.; Tzeng, G.H. Evaluating the implementation of business-to-business m-commerce by SMEs based on a new hybrid MADM model. Manag. Decis. 2015, 3, 290–317. [Google Scholar] [CrossRef]
  60. Liou, J.J.H.; Chuang, Y.H.; Tzeng, G.H. A fuzzy integral-based model for supplier evaluation and improvement. Inf. Sci. 2014, 266, 199–217. [Google Scholar] [CrossRef]
Figure 1. Model procedure for new multiple attribute decision making for the application of cloud computing in auditing.
Figure 1. Model procedure for new multiple attribute decision making for the application of cloud computing in auditing.
Entropy 18 00401 g001
Figure 2. Diagram of the process for the empirical case.
Figure 2. Diagram of the process for the empirical case.
Entropy 18 00401 g002
Figure 3. The INRM of total influence relationships for the application of cloud computing in the auditing.
Figure 3. The INRM of total influence relationships for the application of cloud computing in the auditing.
Entropy 18 00401 g003
Table 1. The pre-test questionnaire risk factors for application of cloud computing in the auditing.
Table 1. The pre-test questionnaire risk factors for application of cloud computing in the auditing.
Perspectives (Dimensions)
Protection systemTechnology risksAutomating user provisioningOperations
Approval layers and controls
Tangible and intangible security
Network connection and data transmission
Authentication method and authorization system
Prevent intrusion Chain of custody process
Patchy response
Supervisor
Segregation of duties
Software monitoring technology
Access rights administration
Removal of entrance
Periodic inspection of access
Data backup
Data recovery
Private laws
Incident management
Undesirable event management
Service resilience
Reliability and availability
Supervision and management function
Table 2. The factors for application of cloud computing in the auditing.
Table 2. The factors for application of cloud computing in the auditing.
Dimensions/CriteriaDescriptionsReferences
Protection system (A)
Tangible and intangible security ( a 1 )Use information assets, systems and peripherals for infrastructure and set necessary restrictions for security purposes.[46,47,48]
Network connection and data transmission ( a 2 )Use Internet connection and data transfer process to ensure data accuracy and authenticity[21,46]
Authentication method and authorization system ( a 3 )Before accessing data, users are required to verify personal password and authorized data.[23,49]
Prevent intrusion ( a 4 )Centralized management model provides all-weather monitoring network and analyzes intrusions.[24,25]
Technology risks (B)
Patchy response ( b 1 )Programs are repaired by software providers when attacked by malwares.[26,28,48,50]
Supervisor ( b 2 )Top management or highly authorized users.[29]
Segregation of duties ( b 3 )Avoid unauthorized access or excessive authorization to ensure that customer information are fully protected and not used by other customers.[29]
Automating user provisioning (C)
Access rights administration ( c 1 )To read or write system files, or be read or written, permission must be granted to change and obtain authorization.[46,48,50]
Removal of entrance ( c 2 )Remove access authorization of former employees and those in violation of level authorization.[48]
Periodic inspection of access ( c 3 )Periodic testing of identity management system to detect damage and ensure access security.[30,31]
Operations (D)
Private laws ( d 1 )Regulate customer data collection, processing and use to avoid infringement of personal rights and promote appropriate use of personal information.[33,49]
Incident management ( d 2 )Information log for operational errors due to incomplete information and hacked important information.[44,46,51]
Undesirable event management ( d 3 )Timely assistance by providers to resolve any information problems and failure.[44,46,51]
Service resilience ( d 4 )Simple and succinct to avoid being burdened by excessive details when updating.[46]
Reliability and availability ( d 5 )Authorized users can access needed information anytime and anywhere.[34,52]
Table 3. Total influence relation matrix P D : four perspectives (or called dimensions).
Table 3. Total influence relation matrix P D : four perspectives (or called dimensions).
PerspectivesABCDRow Sum ( d i )Column Sum ( r i ) d i + r i d i r i
A0.82410.83300.82570.82103.0643.3066.370−0.242
B0.75950.76500.75370.75422.9793.3166.114−0.157
C0.82470.83140.82440.80423.0673.2156.282−0.148
D0.75410.83120.82270.80702.9951.3074.3021.688
Table 4. Total influence relation matrix P C : fifteen criteria.
Table 4. Total influence relation matrix P C : fifteen criteria.
Criteria a 1 a 2 a 3 a 4 b 1 b 2 b 3 c 1 c 2 c 3 d 1 d 2 d 3 d 4 d 5
a 1 0.7140.8300.8610.8450.7590.7870.8080.8080.8020.7930.7120.7960.7830.7710.726
a 2 0.8050.7990.8940.8830.8070.8200.8400.8450.8370.8310.7270.8240.8130.8030.754
a 3 0.7740.8270.7880.8460.7680.7950.8160.8140.8080.7900.7030.7950.7760.7670.723
a 4 0.7980.8610.8770.7990.7880.8040.8240.8330.8260.8210.7160.8240.8060.7940.748
b 1 0.7340.7960.8070.7960.6670.7400.7590.7650.7540.7540.6620.7570.7440.7360.695
b 2 0.7860.8460.8650.8470.7640.7320.8250.8310.8240.8040.7090.8030.7850.7820.727
b 3 0.7890.8430.8710.8510.7560.7990.7540.8310.8230.8070.7120.8050.7920.7850.733
c 1 0.8040.8660.8910.8760.7820.8130.8370.7770.8410.8270.7370.8180.8010.8050.766
c 2 0.7630.8200.8480.8330.7480.7780.7980.8060.7310.7920.6970.7750.7610.7580.711
c 3 0.7990.8640.8860.8790.7930.8160.8360.8390.8330.7620.7340.8220.8110.8060.760
d 1 0.8160.8630.8870.8740.7960.8160.8410.8530.8420.8290.6790.8310.8120.8090.760
d 2 0.7840.8460.8710.8590.7860.7930.8170.8210.8120.8070.7200.7480.8050.7980.752
d 3 0.7690.8260.8570.8470.7720.7820.8050.8110.8040.8000.7130.8070.7230.7820.733
d 4 0.7620.8210.8430.8380.7590.7770.8010.8050.7970.7890.7000.7940.7780.7090.727
d 5 0.7060.7590.7680.7640.6970.7140.7310.7350.7270.7270.6490.7370.7230.7110.613
Note: 1 n ( n 1 ) i = 1 n j = 1 n | g i j p g i j p 1 | g i j p × 100 % = 1.49 % < 5 % , significant confidence is 98.51%, where g i j p and g i j p 1 denote the average scores of the samples for p − 1 and p and n denotes number of criteria, here n = 15 and n × n matrix. Where p = 40 indicates the number of experts.
Table 5. The sum of the influences given and received on the perspectives and criteria.
Table 5. The sum of the influences given and received on the perspectives and criteria.
Perspectives/CriteriaRow Sum (di)Column Sum (ri)di + ridiriOrder
Protection system (A)3.0643.3066.370−0.242
Tangible and intangible security (a1)3.2503.0906.3400.1601
Network connection and data transmission (a2)3.3803.3176.6970.0632
Authentication method and authorization system (a3)3.2353.4206.655−0.1854
Prevent intrusion (a4)3.3343.3726.706−0.0383
Technology risks (B)2.9793.1366.114−0.157
Patchy response (b1)2.1662.1874.353−0.0212
Supervisor (b2)2.3212.2714.5920.0501
Segregation of duties (b3)2.3092.3384.647−0.0293
Automating user provisioning (C)3.0673.2156.282−0.148
Access rights administration (c1)2.4452.4234.8680.0222
Removal of entrance (c2)2.3302.4054.735−0.0753
Periodic inspection of access (c3)2.4342.3824.8160.0521
Operations (D)2.9951.3074.3021.688
Privacy laws (d1)3.8903.4617.3510.4291
Incident Management (d2)3.8223.9177.739−0.0953
Undesirable event management (d3)3.7583.8407.598−0.0822
Service resilience (d4)3.7073.8097.516−0.1024
Reliability and availability (d5)3.4333.5857.018−0.1525
Table 6. Unweighted super-matrix W based on DANP.
Table 6. Unweighted super-matrix W based on DANP.
Criteria a 1 a 2 a 3 a 4 b 1 b 2 b 3 c 1 c 2 c 3 d 1 d 2 d 3 d 4 d 5
a 1 0.2200.2380.2390.2390.2340.2350.2350.2340.2340.2330.2370.2330.2330.2340.236
a 2 0.2550.2360.2560.2580.2540.2530.2510.2520.2510.2520.2510.2520.2500.2520.253
a 3 0.2650.2640.2440.2630.2580.2590.2600.2590.2600.2590.2580.2590.2600.2580.256
b 1 0.2600.2610.2610.2400.2540.2530.2540.2550.2550.2560.2540.2560.2570.2570.255
b 2 0.3230.3270.3230.3260.3080.3290.3270.3220.3220.3250.3240.3280.3270.3250.325
b 3 0.3340.3320.3340.3330.3420.3160.3460.3340.3350.3340.3330.3310.3310.3320.333
b 4 0.3430.3400.3430.3410.3510.3550.3270.3440.3440.3420.3430.3410.3410.3430.341
c 1 0.3360.3360.3380.3360.3370.3380.3380.3180.3460.3450.3380.3370.3360.3370.336
c 2 0.3340.3330.3350.3330.3320.3350.3340.3440.3140.3420.3340.3330.3330.3330.332
c 3 0.3300.3310.3280.3310.3320.3270.3280.3380.3400.3130.3280.3310.3310.3300.332
d 1 0.1880.1850.1870.1840.1840.1860.1860.1880.1880.1870.1740.1880.1900.1890.189
d 2 0.2100.2100.2110.2120.2110.2110.2100.2080.2090.2090.2140.1960.2150.2140.215
d 3 0.2070.2070.2060.2070.2070.2060.2070.2040.2060.2060.2090.2110.1920.2100.211
d 4 0.2040.2050.2040.2040.2050.2050.2050.2050.2050.2050.2080.2090.2080.1910.207
d 5 0.1920.1920.2040.1920.1930.1910.1910.1950.1920.1930.1950.1970.1950.1960.179
Table 7. Weighted super-matrix W α based on DANP.
Table 7. Weighted super-matrix W α based on DANP.
Criteria a 1 a 2 a 3 a 4 b 1 b 2 b 3 c 1 c 2 c 3 d 1 d 2 d 3 d 4 d 5
a 1 0.0600.0660.0660.0660.0660.0660.0660.0660.0660.0650.0660.0650.0650.0650.066
a 2 0.0700.0650.0700.0710.0710.0710.0700.0710.0700.0710.0700.0700.0700.0700.071
a 3 0.0730.0730.0670.0720.0720.0730.0730.0730.0730.0730.0720.0720.0730.0720.072
a 4 0.0720.0720.0710.0660.0710.0710.0710.0720.0720.0720.0710.0710.0720.0720.071
b 1 0.0650.0660.0650.0650.0600.0640.0640.0640.0640.0650.0650.0650.0650.0650.065
b 2 0.0670.0670.0660.0670.0660.0610.0670.0670.0670.0670.0660.0660.0660.0660.066
b 3 0.0690.0680.0690.0680.0680.0690.0630.0690.0690.0680.0680.0680.0680.0680.068
c 1 0.0690.0690.0680.0690.0690.0690.0690.0630.0690.0690.0690.0690.0690.0690.068
c 2 0.0680.0680.0680.0680.0680.0690.0690.0690.0630.0680.0680.0680.0680.0680.068
c 3 0.0670.0680.0670.0680.0680.0670.0670.0680.0680.0630.0670.0670.0680.0670.068
d 1 0.0600.0590.0600.0590.0590.0600.0600.0600.0600.0600.0550.0600.0600.0600.060
d 2 0.0670.0670.0670.0680.0670.0680.0670.0670.0670.0670.0680.0620.0680.0680.068
d 3 0.0660.0660.0660.0660.0660.0660.0660.0650.0660.0660.0660.0670.0610.0670.067
d 4 0.0650.0660.0650.0650.0660.0660.0660.0660.0660.0660.0660.0660.0660.0610.066
d 5 0.0610.0620.0650.0620.0620.0610.0610.0620.0610.0620.0620.0620.0620.0620.057
Table 8. Influential weights of DANP for each criterion obtained by lim k ( W α ) k .
Table 8. Influential weights of DANP for each criterion obtained by lim k ( W α ) k .
Criteria a 1 a 2 a 3 a 4 b 1 b 2 b 3 c 1 c 2 c 3 d 1 d 2 d 3 d 4 d 5
Weights (DANP)0.06530.07010.07210.07100.06430.06610.06800.06850.06780.06720.05950.06710.06590.06530.0617
Table 9. Integrated index of dimensions and criteria.
Table 9. Integrated index of dimensions and criteria.
Dimensions/CriteriaLocal WeightsGlobal Weights (by DANP)PerformanceRelative Gaps
Protection system (A)0.2790.1237.4710.253
Tangible and intangible security (a1)0.2340.0656.9670.303
Network connection and data transmission (a2)0.2520.0707.1330.287
Authentication method and authorization system (a3)0.2590.0727.8000.220
Prevent intrusion (a4)0.2550.0717.9330.207
Technology risks (B)0.1990.1237.4400.256
Patchy response (b1)0.3240.0647.8000.220
Supervisor (b2)0.3330.0667.2330.277
Segregation of duties (b3)0.3430.0687.3000.270
Automating user provisioning (C)0.2030.1237.8990.210
Access rights administration (c1)0.3370.0697.7670.223
Removal of entrance (c2)0.3330.0687.8000.220
Periodic inspection of access (c3)0.3300.0678.1330.187
Operations (D)0.3200.1237.6440.236
Privacy laws (d1)0.1860.0608.3330.167
Incident Management (d2)0.2100.0677.4330.257
Undesirable event management (d3)0.2060.0667.3670.263
Service resilience (d4)0.2050.0657.3670.263
Reliability and availability (d5)0.1930.0627.8000.220
Total performances--7.607-
Total gap (Sk)---0.239
Table 10. The implementation improvement plan.
Table 10. The implementation improvement plan.
ItemsStrategy (Sequence of Improvement Priority)
F1: Influential network of dimensions of DEMATELD _ C _ B _ A
F2: Influential network of criteria within individual dimensionsD: (d1) _ (d3) _ (d2) _ (d4) _ (d5)
(d3) _ (d2) _ (d4) _ (d5)
(d2) _ (d4) _ (d5)
(d4) _ (d5)
C: (c3) _ (c1) _ (c2)
(c1) _ (c2)
B: (b2) _ (b1) _ (b3)
(b1) _ (b3)
A: (a1) _ (a2) _ (a4) _ (a3)
(a2) _ (a4) _ (a3)
(a4) _ (a3)

Share and Cite

MDPI and ACS Style

Hu, K.-H.; Chen, F.-H.; We, W.-J. Exploring the Key Risk Factors for Application of Cloud Computing in Auditing. Entropy 2016, 18, 401. https://doi.org/10.3390/e18080401

AMA Style

Hu K-H, Chen F-H, We W-J. Exploring the Key Risk Factors for Application of Cloud Computing in Auditing. Entropy. 2016; 18(8):401. https://doi.org/10.3390/e18080401

Chicago/Turabian Style

Hu, Kuang-Hua, Fu-Hsiang Chen, and Wei-Jhou We. 2016. "Exploring the Key Risk Factors for Application of Cloud Computing in Auditing" Entropy 18, no. 8: 401. https://doi.org/10.3390/e18080401

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop