External Auditors' Perception of Cloud Computing Use in Indonesia : A Study of Non-Big Four CPA Firm in Bali

Authors

  • Bevi Libraeni Institut Bisnis dan Teknologi Indonesia Author
  • Mila Rosa Desmayani Institut Bisnis dan Teknologi Indonesia Author

DOI:

https://doi.org/10.70895/jemba.v2i1.49

Keywords:

Cloud Computing, Auditor, Small and Medium Enterprises

Abstract

This study explores how cloud computing services enhance audit performance from the perspective of external auditors, focusing on factors influencing adoption among non-Big Four public accounting firms (PAFs). Employing a qualitative approach with an interpretive paradigm, data were collected through in-depth interviews and document analysis. A total of eight external auditors from non-Big Four PAFs in Bali participated in the study. The findings reveal that auditors perceive cloud computing as beneficial due to its ease of access, system reliability, enhanced information sharing, and improved data security. One participant stated, "Cloud platforms help us review client documents remotely and in real-time, which reduces delays in the audit process." Despite these advantages, concerns remain regarding data confidentiality and dependence on internet connectivity. The dominant theoretical lens guiding the analysis is the Technology-Organization-Environment (TOE) framework, supported by elements from the Technology Acceptance Model (TAM) and Institutional Theory. Practically, this study contributes by offering insights into how smaller firms can strategically adopt cloud technology to improve audit efficiency and competitiveness, while addressing institutional and organizational readiness.

Downloads

Download data is not yet available.

References

Abrahamson, E. (1991). Managerial fads and fashions: The diffusion and rejection of innovations. Academy of Management Review, 16(3), 586-612.

Ajzen, I., & Fishbein, M. (1980). Understanding attitudes and predicting social behaviour. Englewood Cliffs, NJ: Prentice-Hall.

Alchian, A. A., & Demsetz, H. (1972). Production, information costs, and economic organization. The American Economic Review, 777-795.

Alshamaila, Y., Papagiannidis, S., & Li, F. (2013). Cloud computing adoption by SMEs in the north east of England: A multi-perspective framework. Journal of Enterprise Information Management, 26(3), 250-275.

Aron, R., Clemons, E. K., & Reddi, S. (2005). Just right outsourcing: Understanding and managing risk. Journal of Management Information

Baker, J. (2011). The technology-organization-environment framework. Information System Theory: Explaining and Predicting Our Digital Society, pp. 231-246.

Banker, R. D., Chang, H., & Kao, Y. (2002). Impact of information technology on public accounting firm productivity. Journal of Information Systems, 16(2), 209-222.

Benlian, A., & Hess, T. (2011). Opportunities and risks of software-as-a-service: Findings from a survey of IT executives. Decision Support Systems, 52(1), 232-246.

Bradford, M., & Florin, J. (2003). Examining the role of innovation diffusion factors on the implementation success of enterprise resource planning systems. International Journal of Accounting Information Systems, 4(3), 205-225.

Braun, R. L., & Davis, H. E. (2003). Computer-assisted audit tools and techniques: Analysis and perspectives. Managerial Auditing Journal, 18(9), 725-731.

Brender, N., & Markov, I. (2013). Risk perception and risk management in cloud computing: Results from a case study of Swiss companies. International Journal of Information Management, 33(5), 726-733.

Cavusoglu, H., Mishra, B., & Raghunathan, S. (2004). The effect of internet security breach announcements on market value: Capital market reactions for breached firms and internet security developers. International Journal of electronic commerce, 9(1), 70-104.

Chau, P. Y., & Tam, K. Y. (1997). Factors affecting the adoption of open systems: An exploratory study. MIS quarterly, 21(1).

Chen, Y., & Bharadwaj, A. (2009). An empirical analysis of contract structures in IT outsourcing. Information Systems Research, 20(4), 484-506.

Chigona, W., Robertson, B., & Mimbi, L. (2012). Synchronised smart phones: the collision of personal privacy and organisational data security. South African Journal of Business Management, 43(2), 31-40.

Chong, A. Y.-L., & Ooi, K.-B. (2008). Adoption of interorganizational system standards in supply chains: An empirical analysis of RosettaNet standards. Industrial Management & Data Systems, 108(4), 529-547.

Clemons, E. K., & Chen, Y. (2011). Making the decision to contract for cloud services: managing the risk of an extreme form of IT outsourcing. Paper presented at the System Sciences (HICSS), 2011 44th Hawaii International Conference on.

Clemons, E. K., & Hitt, L. M. (2004). Poaching and the misappropriation of information: Transaction risks of information exchange. Journal of Management Information Systems, 21(2), 87-107.

Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technology: a comparison of two theoretical models. Management science, 35(8), 982-1003.

DeLone, W.H., & McLean, E. R. (2013). The DeLone and McLean model of information systems success: a ten-year update. Journal of Management Information Systems, Vol.19 (4), pp.9-30

Depietro, R., Wiarda, E., & Fleischer, M. (1990). The context for change: Organization, technology and environment. In L. G. Tornatzy & F. Mitchell (Eds.), The processes of technological innovation (pp. 151-175). Lexington, Mass.: Lexington Books.

Devaki, S. (2011). File storage trends in cloud computing era. Siliconindia, 14(8), 34-35. DiMaggio, P. J. (1988). Interest and agency in institutional theory. Institutional patterns and organizations: Culture and environment, 1, 3-22.

DiMaggio, P. J., and Powell, W. W. (1983). The iron cage revisited: Institutional isomorphism and collective rationality in organizational fields. American sociological review, 48(April), 147-160.

Feeny, D. F., & Willcocks, L. P. (1998). Core IS capabilities for exploiting information technology. Sloan Management Review, 39(3), 9-21.

Fikri, Abdillah, L.A., & Apriyani, E. (2015). Perancangan teknologi cloud untuk penjualan online kain songket palembang. Seminar Nasional Sistem Informasi Indonesia, 387-392.

Fishbein, M., & Ajzen, I. (1975). Belief, attitude, intention and behavior: An introduction to theory and research.

Garrison, G., Kim, S., & Wakefield, R. L. (2012). Success factors for deploying cloud computing. Communications of the ACM, 55(9), 62-68.

Gelinas, U., Dull, R., & Wheeler, P. (2011). Accounting information systems: Cengage learning.

Glaser, B. G. (1998). Doing grounded theory: Issues and discussions: Sociology press.

Goscinski, A., & Brock, M. (2010). Toward dynamic and attribute based publication, discovery and selection for cloud computing. Future Generation Computer Systems, 26(7), 947-970.

Lin, A., & Chen, N.-C. (2012). Cloud computing as an innovation: Percepetion, attitude, and adoption. International Journal of Information Management, 32(6), 533-540.

Low, C., Chen, Y., & Wu, M. (2011). Understanding the determinants of cloud computing adoption. Industrial Management & Data Systems, 111(7), 1006-1023.

Lee, Jay., Kao, Hung-An., & Yang, Shuanhu. (2014). Service innovation and smart analytic for industry 4.0 and big data environment. Journal Procedia CIRP , 16, 3-8. Diakses dari https://www.sciencedirect.com

Lee, S.-G., Chae, S. H., & Cho, K. M. (2013). Drivers and inhibitors of SaaS adoption in Korea. International Journal of Information Management, 33(3), 429-440.

Mahesh, S., Landry, B. J. L., Sridhar, T., & Walsh, K. R. (2011). A decision table for the cloud computing decision in small business. Information Resources Management Journal, 24(3), 9-25.

Malmi, T. (1999). Activity-based costing diffusion across organizations: an exploratory empirical analysis of Finnish firms. Accounting, Organizations and Society, 24(8), 649-672.

March, J. G. (1978). Bounded rationality, ambiguity, and the engineering of choice. The Bell Journal of Economics, 587-608.

Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., & Ghalsasi, A. (2011). Cloud computing: The business perspective. Decision Support Systems, 51(1), 176-189.

Moleong, L. J. 2010. Metodologi Penelitian Kualitatif, Bandung: Remaja Rosda karya.

Neuman, W. L. (2005). Social research methods: Quantitative and qualitative approaches: Allyn and Bacon.

Singleton, T. & Flesher, D.L. (2003). “A 25 years retrospective on the IIA’s SAC project”. Managerial Auditing Journal, 18(1), 39-53.

Sugiarto, E. (2017). Menyusun proposal penelitian kualitatif: Skripsi dan tesis: Suaka media. Diandra kreatif.

Sugiono, A. 2014. “Makna Pajak dan Retribusi (Perspektif Wajib Pajak Pedagang Kaki Lima Kawasan SAE Salera Pamekasan)”. Tesis. Jurusan Akuntansi, Fakultas Ekonomi dan Bisnis, Universitas Brawijaya.

Sugiono, A., Ludigdo, U., & Baridwan, Z. (2015). Makna Pajak dan Retribusi: Perspektif Pedagang Kaki Lima. Jurnal Akuntansi Multiparadigma, 6(1), 53–78. https://doi.org/10.18202/jamal.2015.04.6006

Sugiyono. (2016). Metode Penelitian Kuantitatif, Kualitatif, dan R&D. Bandung: CV. Alfabeta.

Yaumi, M., & Damopolii, M. (2014). Action Research: Teori, Model, dan Aplikasi. Jakarta: Kencana Prenada Media Group.

Downloads

Published

2025-07-09

How to Cite

External Auditors’ Perception of Cloud Computing Use in Indonesia : A Study of Non-Big Four CPA Firm in Bali. (2025). Jurnal Ekonomi Manajemen Bisnis Dan Akuntansi, 2(1), 31-45. https://doi.org/10.70895/jemba.v2i1.49