Tawei Wang

Tawei Wang
DePaul University · School of Accountancy and MIS

PhD

About

121
Publications
58,124
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,059
Citations
Introduction
Tawei (David) Wang is currently an KPMG/Neil F. Casson Endowed Professor at DePaul University. He received his Ph.D. from Krannert Graduate School of Management, Purdue University in 2009. His research interests are information security management and IT management.
Additional affiliations
August 2005 - August 2009
Purdue University West Lafayette
Position
  • PhD Student
August 2009 - July 2011
National Taiwan University
Position
  • Professor (Assistant)
August 2011 - present
University of Hawaiʻi at Mānoa
Position
  • Professor (Assistant)

Publications

Publications (121)
Article
This study examines whether management responds to adverse events and how the press releases after adverse events are associated with analyst recommendation. Using Securities Exchange Act of 1934 Section 10b lawsuits – manipulative and deceptive practices in securities trading – as the proxy for adverse events, we show that companies do not always...
Chapter
Full-text available
This study conducts a literature review of digital transformation (DT) in the accounting field and compares the research trends of DT in the accounting and information systems fields. We adopt a topic modeling-based approach of latent Dirichlet allocation to identify the topic to review the DT-related literature in the information systems and accou...
Book
This book elucidates the digital transformation of accounting by examining the countless challenges academic institutions encounter in the wake of technological progress. This underscores the importance of accountants in enhancing their skill set to align with today’s evolving digital landscape. The text evaluates cutting-edge technologies, such as...
Chapter
Full-text available
Artificial Intelligence (AI) in automated decision-making systems (ADM) is becoming more prevalent in business, enabling faster and more accurate decision-making. However, using ADM raises ethical concerns (i.e., privacy, bias, and accountability) and legal issues. Organizations using ADM systems should ensure that they have adequate controls and s...
Article
Full-text available
According to a Deloitte survey in 2022 , 76 percent of respondents had their IT services delivered through third party models, and more than 90 percent of the respondents will rely on third-party service providers for data analytics and robotic process automation deployment arrangements. However, as these organizations (called user entities) can no...
Article
Full-text available
Organisational information security (ISec) protection is undergoing a turbulent shift in the workplace environment. In an environment of ever‐increasing risks of insider threats and external cyberattacks, individual employees are often expected to take the initiative to solve organisational security problems. This study therefore focuses on employe...
Article
Purpose Both the SEC (Securities and Exchange Commission) and the popular press have routinely criticized firms for the complexity of their financial disclosures. This study aims to investigate how financial analysts respond to the tone complexity of firm disclosures. Design/methodology/approach Using approximately 20,000 earnings conference call...
Article
This study investigates whether audit clients’ blockchain activities (including crypto-related activities) affect audit risk by examining the association between blockchain disclosures in 10-K filings and audit fees. Focusing on U.S. firms between 2013 and 2020, we empirically show that audit fees are higher for companies disclosing blockchain acti...
Article
Data analytics (DA) has gained widespread attention in accounting and auditing recently. Despite the significant potential presented by DA programming languages such as R and Python, their application remains limited. This study presents the tidyverse approach of R for DA in the field of accounting. This approach can greatly benefit undergraduate o...
Article
Full-text available
This study examines the value relevance of a firm’s artificial intelligence (AI) implementation and its awareness of the related risks. We proxy a firm’s AI implementation by AI-related disclosures and risk factors in 10-K filings to the U.S. Securities and Exchange Commission. Our results show that AI implementation disclosures in 10-K filings are...
Article
In recent years, many initial coin offerings (ICOs) scams have been reported, attracting attention to this relatively new and unregulated ICO market, which lacks disclosure requirements and therefore suffers from intensifying problems of information asymmetry inherent in crowdfunding. As a prospectus‐type document, an ICO white paper serves as a ma...
Article
This article summarizes the study of Rozario, Vasarhelyi, and Wang (2022), which examines the use of consumer tweets in improving the prediction and error detection performance of preliminary analytical procedures for the revenue account for firms that belong to consumer-oriented industries. They find that consumer tweets about product or brand int...
Article
This case analyzes how Zalora has applied various strategies to gain a sustainable advantage in the e-commerce industry and provide solutions that continuously add value to its customers, even during the COVID-19 pandemic. It describes the company’s efforts to capitalize on customer demand and external and internal forces to be more agile and nimbl...
Article
Facial expression recognition (FER) has drawn the interest of practitioners and researchers due to its potential in opening new business opportunities. One critical aspect of any successful FER system is a feature extraction method that can efficiently find sufficient facial features and characterize facial expressions. This paper proposes an appea...
Article
Geographic information may be used in audit tasks, such as identifying high-risk cases involving suspicious entities usually located close to each other. However, the existing approach of text string analysis on addresses may only be able to match companies located in the same city or street. Following a design science approach, we propose using th...
Article
Cybersecurity comment letters issued by the Securities and Exchange Commission (SEC) may ask companies to disclose additional or clarifying information about their cybersecurity incidents, risks, and corresponding controls, where appropriate. Although responding to the comment letter in the form of disclosing more information about cybersecurity ca...
Article
Full-text available
Social networking platforms allow people to connect and socialize online, but the extant research suggests that increased social media (SM) use also leads to fatigue, affecting individual well-being. During the coronavirus (COVID-19) pandemic when millions of people were confined to their homes, SM use surged, posing questions about changes in indi...
Article
During the First International Conference of the Journal of Information Systems in Taiwan, a panel was formed to discuss the development of digital transformation with panelists from the US, Singapore, and New Zealand. This paper is a summary of the panelists’ viewpoints and the participants’ interactions during the session. The discussion demonstr...
Article
This paper presents the Python code and illustrative crisis management data from Twitter. The code includes Twitter data collection and three machine learning algorithms that are readily usable. Three machine learning algorithms generate sentiment measures, extract topics from the tweets and, compare the similarity of topics across time. The code a...
Article
We examine whether consumer-generated tweets about purchases (interest) and sentiment are useful in assessing the risk of misstated revenue in the planning stage of the audit, as reflected in improvements to analytical procedures, for firms in consumer-facing industries. We obtain consumer-generated tweeting activities from 2012 to 2017 for 76 comp...
Article
The study of cybersecurity issues plays a fundamental role in accounting information systems (AIS) research. However, as the importance of cybersecurity has continued to grow in other disciplines, such as computer science and management information systems, it has become less clear what is distinct about AIS-based cybersecurity research, what uniqu...
Article
Full-text available
High-profile cybersecurity breaches have raised concerns regarding how organizations disclose security management information to the public. The American Institute of Certified Public Accountants (AICPA) developed a cybersecurity risk management (CSRM) reporting framework to better help organizations convey their cybersecurity programs to the publi...
Article
Full-text available
In June 2018, the SEC adopted Inline eXtensible Business Reporting Language (iXBRL), which embeds XBRL data into HTML-formatted annual reports to improve the accessibility and usefulness of the information disclosures to investors. This study assesses the effectiveness of iXBRL by examining its impact on informational efficiency and information asy...
Article
SYNOPSIS In June 2018, the SEC adopted Inline eXtensible Business Reporting Language (iXBRL), which embeds XBRL data into HTML-formatted annual reports to improve the accessibility and usefulness of the information disclosures to investors. This study assesses the effectiveness of iXBRL by examining its impact on informational efficiency and inform...
Article
Purpose In this commentary, the author uses the development of data analytics curriculum at DePaul University as an example to highlight possible challenges and share the experience. In addition, seven different possible future research directions are identified so the readers are able to understand more about the impact of emerging technologies on...
Article
We present a novel hands-on approach for teaching students the concepts and business processes of transaction cycles. Specifically, the hands-on activities focus on sales and procurement cycles. Upon completion of the hands-on activities, students will a) develop a better understanding of the business processes and business forms for sales and proc...
Article
This paper investigates whether the market values risk factor disclosures in the context of mergers and acquisitions (M&A) and how the involvement of top‐tier investment banks affects the association. We complement previous research on risk factor disclosures by suggesting that the inter‐organizational relationship between companies and investment...
Article
This study investigates whether there is any spillover uncertainty regarding a rival firm’s future operations upon a focal firm’s announcement of cybersecurity breaches and whether the existence of a chief information officer (CIO) in rival firms can reduce this spillover uncertainty. Using abnormal trading volume to capture the change in investors...
Article
Initial coin offering (ICO) has attracted a lot of attention from the public in recent years due to its association with potentially fraudulent activities. In order to offer practical implications to investors and regulators when evaluating ICO projects, this study examines the use of textual analysis in detecting potential ICO fraud cases. By usin...
Article
SYNOPSIS Due to recent high-profile cybersecurity breaches and increased practitioner and regulatory attention, organizations are under pressure to consider the accounting implications of these attacks and develop appropriate responses. Specifically, cybersecurity events may affect organizations' operations, financial and non-financial performance,...
Article
Full-text available
This study explores how to use smart contract technology to implement accounting principles for public use. To illustrate its feasibility, this study develops a design model of decentralized accounting contracts (DACs) and uses revenue recognition to demonstrate how to apply the proposed model. Considering various scenarios of revenue recognition,...
Article
Full-text available
The size of the global fashion industry is about 300 billion dollars in 2020 and is expected to continue to grow [1]. Fashion not only reflects the creativity but also has implications on our daily lives and the economics. The advance in information technology, proliferation of a wide variety of data and the availability of different methods have p...
Article
Prior studies have demonstrated that company-generated tweets as a device for the dissemination of corporate announcements help reduce information asymmetry. This paper demonstrates that user-generated tweets around corporate announcements have information content in addition to the information content of the announcement itself. Using a sample of...
Article
This study examines whether the unique and common content of initial coin offering (ICO) white papers is related to ICO fund raising and post‐ICO trading activities. Based on the signalling theory, we expect that high‐quality ICOs can provide more unique content in their white papers to distinguish themselves from low‐quality ICOs because it may be...
Article
Full-text available
The COVID-19 pandemic has had an unprecedented impact on the sports industry, affecting from professional sports activities to the 2020 Summer Olympics. It has wreaked havoc on the sports calendar, causing a number of events to be canceled or postponed. This study proposes a methodology by which the sports industry can assess public perceptions and...
Chapter
This article investigates the transfer of information security breach information between breached firms and their peers. Using a large data set of information security incidents from 2003 to 2013, the results suggest that 1) the effect of information security breach information transfer exists between breached firms and non-breached firms that off...
Chapter
This chapter provides an overview of several recently proposed or passed privacy-related regulations, including General Data Protection Regulation (GDPR), California Consumer Privacy Act (CCPA), Illinois Video Interview Act, Data Broker Regulations in Vermont, and Privacy Bill of Rights Act, and related but very limited studies. Toward the end, sev...
Article
In this paper, we introduce a data analytics exercise that can be used in an intermediate financial accounting course. We discuss the concept behind the design of the exercise to allow readers to formulate similar exercises. The exercise is aimed at helping students to focus more on business operations, better understand business issues, consider d...
Article
Full-text available
Accounting programs are now being encouraged to incorporate data analytics into their programs. This article will provide suggestions on how to set up a data analytics program in a school of accountancy, answer why it is important to incorporate data analytics within accounting programs, and nally how to create a well-integrated curriculum.
Conference Paper
Full-text available
The goal of integrating a peer learning module in a data analytics course is to help students (1) learn from classmates' different perspectives, (2) perform analysis and make recommendations under ambiguous decision environments, and (3) practice higher level professional skills, such as communication, critical thinking and coaching with constructi...
Article
This paper explores the joint effect of competitive actions and social media related interactions on offline car sales after automobile recalls. Our analysis of all the mid-size automobile recall events in the U.S. from 2010 to 2015, the corresponding social media discussions of the recall and the competitive actions taken by the recalling firms an...
Conference Paper
This paper investigates the association between board busyness (i.e., directors with multiple positions) and the occurrence of reported information security incidents. Building on prior studies of board busyness, this paper argues that directors holding multiple board seats may fail to commit the time and effort necessary to ensure the appropriate...
Chapter
This chapter provides an overview of several recently proposed or passed privacy-related regulations, including General Data Protection Regulation (GDPR), California Consumer Privacy Act (CCPA), Illinois Video Interview Act, Data Broker Regulations in Vermont, and Privacy Bill of Rights Act, and related but very limited studies. Toward the end, sev...
Article
Full-text available
This study examines the value relevance of blockchain and cryptocurrency disclosures in firms' 10-K filings, which act as proxies for the firms' involvement in this trending technology and its applications. Using textual analysis to quantify blockchain and cryptocurrency disclosures, the study first shows that these disclosures overall are value re...
Article
This instructional resource describes a classroom exercise that assists students to understand the importance of performing interviews for auditors. The exercise allows students topractice their interview skills in the context of a business continuity problem. Students are assigned to groups of two and are randomly chosen to play the role of either...
Article
Full-text available
Big data has been widely discussed for several years. However, whether the implementation of big data really bring in observable benefits on firm performance remains a critical issue for the top management team. In this study, we investigate the association between big data implementation and the corresponding financial performance, productivity, a...
Article
Full-text available
We broadly define computer auditing as any audit practices that may rely on information technology (IT). Such skill has long been argued and considered to be an important capability for both external and internal auditors for more than two decades though its applications were relatively limited in the past. In recent years, with the advance of info...
Article
Our understanding of relevant internal controls at the post-implementation phase remains limited in spite of general guidance from professional frameworks or standards. In this study, based on the COBIT 5 framework, we reviewed 56 studies from relevant academic journals from 1998 to 2014 to form an initial list of information technology (IT) intern...
Article
Customer capital, one of the major components of intellectual capital, relates to the relationships of companies and their customers. In recent years, data breaches and privacy scandals have raised regulatory concerns and jeopardized customer capital regarding the protection of personal data. Introduced in May 2018 by the EU, the General Data Prote...
Article
The Internet of Things connects devices or sensors to the Internet for data collection and exchange. These pieces of data provide rich information about production and inventory as well as sales and marketing efforts.
Article
We present an in-class scenario-based exercise by which accounting information systems students learn about the Committee of Sponsoring Organizations of the Treadway Commission (COSO) 2013 Framework. Students are randomly assigned to groups of three to five, and each group receives a list of 17 principles and 17 scenarios. These scenarios are based...
Article
Full-text available
This article investigates the transfer of information security breach information between breached firms and their peers. Using a large data set of information security incidents from 2003 to 2013, the results suggest that 1) the effect of information security breach information transfer exists between breached firms and non-breached firms that off...
Article
Social media has become one of the major industrial marketing channels for companies. Because of the nature of social media, social media marketing produces a strong branding effect for small and medium enterprises (SMEs) in the fashion industry. This study contributes to social media analytics research by exploring the interactions between private...
Article
After a series of recent high-profile information security breach incidents, practitioners have engaged in heated debates about the role of the chief information officer (CIO), particularly his/her role in information security risk management. However, little is known in the academic literature about how a CIO's appetite for risk affects the effect...
Article
SYNOPSIS Prior literature has firmly established the relationship between IT capability and firm performance. In this paper, we extend the research in this field and investigate (1) whether IT capability contributes to management forecast accuracy, and (2) whether IT capability improves the informativeness of management forecasts and enhances the e...
Article
Skip to main content You have institutional accessClose OutlineDownloadExport International Journal of Accounting Information Systems Volume 29, June 2018, Pages 16-36 The topical link model-integrating topic-centric information in XBRL-formatted reports Author links open overlay panelChi-ChunChouaNen-Chen RichardHwangbTaweiWangcRogerDebrecenyd a...
Article
Cybersecurity risk disclosure has received great attention in the past several years, especially after the passage of the Securities and Exchange Commission's (SEC's) cybersecurity disclosure guidance published on October 13, 2011. In this study, we examine the usefulness of cybersecurity-related risk factors disclosed in 10-K filings. We document...
Article
Full-text available
This paper examines both the opportunities and limitations in the use of social media for accounting research. Given the dynamic nature of social media and the richness of the context, there are opportunities for researchers to directly observe communication and information exchanges, typically within the context of an observable social network. Th...
Article
The concept of continuous auditing has been around for more than three decades. Although researchers have made great progress in enhancing our understanding and the implementation of continuous auditing, several challenges remain. This paper provides a new conceptual framework, the integrated continuous auditing approach, to potentially overcome th...
Article
This research proposes a Corporation Network Centrality Score (CNCS) that exploits the social network implicit in Twitter interactions that are relevant to capital markets. The CNCS is the eigenvector network centrality score for interactions about corporations. The CNCS provides a summary numeric metric that captures a wide range of market-relevan...
Article
This study observes a significantly negative moderating effect of the disclosing patterns of risk factors in initial public offerings (IPOs) prospectus on the association between strategic alliances and underpricing of biotechnology IPOs. Our findings suggest that strategic alliances mitigate information uncertainties when risk factor disclosures a...
Article
Full-text available
This study investigates the association between investment decisions and financial reporting quality in the context of family firms versus non-family firms. Building on the classic agency theory and the behavioral agency theory, we argue that financial reporting quality may play a different role on investment decisions for family and non-family fir...
Article
This paper studies the adoption and diffusion of a cross-cultural Interorganizational Information System (IOS), which is used to streamline the processing of financial transactions between European investment fund companies and Taiwanese banks. Drawing from institutional and organizational legitimacy theory, we argue that the adoption and implement...
Article
Purpose – The purpose of this paper is to investigate the relation between voluntary accounting changes (VACs) and post-earnings announcement drift. In addition, the authors examine how accounting choice heterogeneity moderates such association. Design/methodology/approach – The authors collect VAC firms in the US in the period from 1994 to 2008 a...
Article
Purpose – This study aims to examine the relation between voluntary accounting changes (VACs) and analyst following. Design/methodology/approach – A sample of firms was collected with VACs in the period from 1994 to 2008 and their major competitors, as well as industry benchmarking firms without accounting changes. The authors then investigated ho...
Article
Full-text available
Data analytics has been emphasized as an effective tool in audit engagements. However, both our understanding and the use of data analytics in audit engagements are limited. The objective of this paper is to draw academic researchers’ attentions to the issues of data analytics identified by an experienced practitioner in the field. These issues ran...
Article
This paper investigates whether the adoption of XBRL is associated with market reactions to earnings surprises around 10-Q and 10-K filing dates based on a sample of XBRL filers in all three phases. Our main findings demonstrate that the adoption of XBRL is positively associated with market reactions to earnings surprises around 10-Q and 10-K filin...
Chapter
Given the multifaceted problems and complexities of information security, the manner in which top management teams make investment and management decisions regarding security technologies, policy initiatives, and employee education could have a significant impact on the likelihood of information security breaches in organizations. In the context of...
Article
Information systems (IS) support in organizations has undergone dramatic changes over the years. IS professionals in the support function have become an important knowledge source to colleagues who seek assistance with their IS usage. Our understanding of IS professionals' customer-oriented behaviours is limited, however. Focusing on IS post-implem...
Article
This paper investigates the association between the mandatory adoption of the eXtensible Business Reporting Language (XBRL) in China and foreign institutional investors' interest. Based on a sample from the Shanghai Stock Exchange and the Shenzhen Stock Exchange in the period from 2004 to 2009, our results demonstrate that the adoption of XBRL is p...
Article
We study corporate website disclosures in the U.S. and Taiwan, two countries with different regulatory and market environments, to provide insights into the uniformity of website content and its contribution to the information environment. We observe significant variation in content both within and between the two countries. U.S. firms with higher...
Conference Paper
IT employees' skills and competency: from technical skills in managing computer operations, programming, and processing data in the 1960s and 1970s, to business operations, management, and interpersonal communication. — IT employees' customer-oriented behaviors: expected in service organizations, e.g., IT help desks and call centers, but not specif...
Article
This paper investigates the impact of mandatory adoption of the eXtensible Business Reporting Language (XBRL) on performance of listed state-owned enterprises (SOEs) and non-SOEs. Building on the institutional theory, we hypothesize and find that non-SOEs benefit from the adoption of XBRL by operating more effectively which results in better perfor...
Article
Information systems (IS) support in organizations has undergone dramatic changes over the years. IS professionals in the support function have become an important knowledge source to colleagues who seek assistance with their IS usage. Our understanding of IS professionals' customer-oriented behaviours is limited, however. Focusing on IS post-implem...

Network

Cited By