<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "https://jats.nlm.nih.gov/publishing/1.3/JATS-journalpublishing1-3.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" dtd-version="1.3" article-type="research-article"><front><journal-meta><journal-id journal-id-type="issn">2541-6111</journal-id><journal-title-group><journal-title>Riset Akuntansi dan Keuangan Indonesia</journal-title><abbrev-journal-title>reaksi</abbrev-journal-title></journal-title-group><issn pub-type="epub">2541-6111</issn><issn pub-type="ppub">1411-6510</issn><publisher><publisher-name>Universitas Muhammadiyah Surakarta</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="doi">10.23917/reaksi.v9i3.6424</article-id><article-categories/><title-group><article-title>Enhaching Fraud Detection Through Auditor Religiosity, Computer Assisted Audit Techniques, and Task Specific Knowledge: The Moderating Impact of Big Data on Auditors in BPKP, Sumatera Island</article-title></title-group><contrib-group><contrib contrib-type="author"><name><surname>Betri</surname></name><address><country>Indonesia</country><email>betri.sirajuddin@gmail.com</email></address><xref ref-type="aff" rid="AFF-1"/><xref ref-type="corresp" rid="cor-0"/></contrib><contrib contrib-type="author"><name><surname>Hafidz</surname><given-names>Ridho</given-names></name><address><country>Indonesia</country></address><xref ref-type="aff" rid="AFF-1"/></contrib><aff id="AFF-1">Universitas Muhammadiyah Palembang</aff></contrib-group><author-notes><corresp id="cor-0"><bold>Corresponding author: Betri</bold>, Universitas Muhammadiyah Palembang .Email:<email>betri.sirajuddin@gmail.com</email></corresp></author-notes><pub-date date-type="pub" iso-8601-date="2024-12-31" publication-format="electronic"><day>31</day><month>12</month><year>2024</year></pub-date><pub-date date-type="collection" iso-8601-date="2024-12-31" publication-format="electronic"><day>31</day><month>12</month><year>2024</year></pub-date><volume>9</volume><issue>3</issue><fpage>350</fpage><lpage>370</lpage><history><date date-type="received" iso-8601-date="2024-8-23"><day>23</day><month>8</month><year>2024</year></date><date date-type="accepted" iso-8601-date="2025-2-3"><day>3</day><month>2</month><year>2025</year></date></history><permissions><copyright-statement>Copyright (c) 2025 Riset Akuntansi dan Keuangan Indonesia</copyright-statement><copyright-year>2025</copyright-year><copyright-holder>Riset Akuntansi dan Keuangan Indonesia</copyright-holder><license><ali:license_ref xmlns:ali="http://www.niso.org/schemas/ali/1.0/">https://creativecommons.org/licenses/by-nc-sa/4.0</ali:license_ref><license-p>This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.</license-p></license></permissions><self-uri xlink:href="https://journals2.ums.ac.id/index.php/reaksi/article/view/6424" xlink:title="Enhaching Fraud Detection Through Auditor Religiosity, Computer Assisted Audit Techniques, and Task Specific Knowledge: The Moderating Impact of Big Data on Auditors in BPKP, Sumatera Island">Enhaching Fraud Detection Through Auditor Religiosity, Computer Assisted Audit Techniques, and Task Specific Knowledge: The Moderating Impact of Big Data on Auditors in BPKP, Sumatera Island</self-uri><abstract><p>This study investigates the impact of Auditor Religiosity, Computer Assisted Audit Techniques (CAATs), and Task Specific Knowledge on Fraud Detection, with Big Data serving as a moderating variable. Conducted at the Representative Offices of the State Development Audit Agency in Sumatera, the associative research utilized primary data from 220 questionnaires, analyzed via Partial Least Square Structural Equation Modeling (PLS-SEM). Findings reveal that Auditor Religiosity and Task Specific Knowledge significantly influence Fraud Detection, while CAATs do not. Additionally, Big Data does not moderate the effects of Auditor Religiosity and Task Specific Knowledge on Fraud Detection (homologizer moderator). However, Big Data moderates (strengthens) the influence of Computer Assisted Audit Techniques on Fraud Detection (pure moderator).</p></abstract><kwd-group><kwd>Auditor Religiosity</kwd><kwd>Computer Assisted Audit Techniques</kwd><kwd>Task Specific Knowledge</kwd><kwd>Big Data</kwd><kwd>Fraud Detection</kwd></kwd-group><custom-meta-group><custom-meta><meta-name>File created by JATS Editor</meta-name><meta-value><ext-link ext-link-type="uri" xlink:href="https://jatseditor.com" xlink:title="JATS Editor">JATS Editor</ext-link></meta-value></custom-meta><custom-meta><meta-name>issue-created-year</meta-name><meta-value>2024</meta-value></custom-meta></custom-meta-group></article-meta></front><body><sec><title>Introduction</title><p>In this era of globalization, governmental institutions face significant challenges in maintaining their financial and operational integrity amidst increasingly complex economic and administrative dynamics. Uncertainty in public policies, demands for effective budget management, and the high need for accountability and transparency are primary focuses. Governments must ensure robust systems, both financially and in managerial practices, to prevent fraud amid financial instability. According to<xref ref-type="bibr" rid="BIBR-1">[1]</xref>, Fraud Detection can be described as a series of actions aimed at identifying early signs or strong indicators of potential fraudulent activities, while limiting opportunities for perpetrators. Religiosity, as discussed by <xref ref-type="bibr" rid="BIBR-2">[2]</xref> and <xref ref-type="bibr" rid="BIBR-25">[25]</xref>, relates to individuals' levels of conception and commitment to their religion. Individuals with high religiosity tend to have strict moral standards and strong work ethics, making them better able to identify fraudulent actions. CAATs, as defined by <xref ref-type="bibr" rid="BIBR-4">[4]</xref>, are tools, technologies, and software aiding auditors in control testing, data analysis, and auditing. The use of CAATs can improve audit efficiency and effectiveness, allowing auditors to conduct tests and analyze data more accurately and swiftly. <xref ref-type="bibr" rid="BIBR-5">[5]</xref> suggest that auditors should no longer rely solely on conventional approaches in Fraud Detection, as failure to gather accurate audit evidence can significantly impact the occurrence of fraud. Task Specific Knowledge, according to <xref ref-type="bibr" rid="BIBR-6">[6]</xref>, pertains to information relevant to audit tasks, aiding auditors in understanding the audited environment and internal conditions, thereby enhancing their assessment quality. <xref ref-type="bibr" rid="BIBR-7">[7]</xref> explain that Big Data refers to large, complex data sets requiring advanced technology for analysis. Govindan et al., (2018) state that Big Data has the potential to enhance forensic audit functions in Fraud Detection.</p><p>Previous studies by <xref ref-type="bibr" rid="BIBR-9">[9]</xref> dan <xref ref-type="bibr" rid="BIBR-10">[10]</xref> find that religiosity affects Fraud Detection by auditors, consistent with the research by <xref ref-type="bibr" rid="BIBR-11">[11]</xref> which asserts the significant influence of religiosity on auditors' ability to detect fraud. However, research by<xref ref-type="bibr" rid="BIBR-12">[12]</xref> suggests different results, indicating that religiosity does not influence internal auditors' ability to detect fraud. Findings from<xref ref-type="bibr" rid="BIBR-13">[13]</xref>, <xref ref-type="bibr" rid="BIBR-14">[14]</xref>, <xref ref-type="bibr" rid="BIBR-15">[15]</xref>, dan <xref ref-type="bibr" rid="BIBR-16">[16]</xref> support the significant impact of CAATs on Fraud Detection. Research by <xref ref-type="bibr" rid="BIBR-17">[17]</xref> using a qualitative approach confirms that CAATs implementation plays a crucial role in the audit process and benefits Fraud Detection. Conversely, studies by <xref ref-type="bibr" rid="BIBR-19">[19]</xref> dan <xref ref-type="bibr" rid="BIBR-18">[18]</xref> suggest that information technology usage does not affect Fraud Detection by auditors. Studies by <xref ref-type="bibr" rid="BIBR-20">[20]</xref>, Betri &amp; Kusumawaty (2019), <xref ref-type="bibr" rid="BIBR-22">[22]</xref> indicate that Task Specific Knowledge influences Fraud Detection by auditors, supported by research by <xref ref-type="bibr" rid="BIBR-23">[23]</xref>, <xref ref-type="bibr" rid="BIBR-24">[24]</xref>, <xref ref-type="bibr" rid="BIBR-25">[25]</xref>, dan <xref ref-type="bibr" rid="BIBR-26">[26]</xref>. <xref ref-type="bibr" rid="BIBR-27">[27]</xref>, <xref ref-type="bibr" rid="BIBR-28">[28]</xref>, <xref ref-type="bibr" rid="BIBR-10">[10]</xref>, dan <xref ref-type="bibr" rid="BIBR-29">[29]</xref> have shown that Big Data influences Fraud Detection. However, research conducted by <xref ref-type="bibr" rid="BIBR-30">[30]</xref> yielded different results, indicating that Big Data does not affect Fraud Detection.</p><p>Religiosity plays a crucial role in enhancing auditor integrity during the audit process. Moreover, the utilization of Computer-Assisted Audit Techniques (CAATs) enables auditors to optimize the efficiency and effectiveness of audit procedures. This facilitates more accurate and swift data testing and analysis by auditors. Additionally, the pivotal role of Task Specific Knowledge cannot be overlooked, as it aids auditors in planning and executing audit procedures more systematically, thereby enhancing the quality of their assessments. Throughout the audit process, Task Specific Knowledge assists auditors in comprehending and resolving audit tasks, consequently improving the quality of their evaluations. Furthermore, Big Data exerts a significant influence, reinforcing the impact of auditor religiosity by providing broader access to relevant data. This enables auditors to track suspicious transactions that may contravene ethical or integrity principles. Moreover, in terms of CAATs utilization, Big Data enhances its effectiveness by enabling rapid and accurate analysis of large data volumes, thereby strengthening auditors' ability to identify suspicious patterns or anomalies. Lastly, Big Data also reinforces the influence of specific knowledge on audit tasks by providing broader access to relevant industry and business data. This allows auditors with in-depth knowledge of the audit context to identify suspicious patterns or trends that may go undetected manually.</p></sec><sec><title>Literature Review and Hypothesis Development</title><p><xref ref-type="bibr" rid="BIBR-31">[31]</xref> developed the Unified Theory of Acceptance and Use of Technology, which posits that technology usage is influenced by four main factors: performance expectancy, effort expectancy, social influence, and facilitating conditions. This theory provides insights into how information technology can aid in Fraud Detection by auditors by understanding the factors that influence technology adoption. The concept of cognitive dissonance theory, first proposed by <xref ref-type="bibr" rid="BIBR-32">[32]</xref>, lays a crucial foundation for understanding communication dynamics and social influence. This theory highlights the inconsistency between cognitive elements, creating psychological discomfort. <xref ref-type="bibr" rid="BIBR-26">[26]</xref> underscore that cognitive dissonance theory impacts the change in auditor attitudes to predict intentions, aiming to reduce the arising inconsistency or dissonance. These cognitive factors guide auditors to ensure that the opinions they express after an audit align with the evidence they uncover during the examination process. The assumption of this theory is that individuals tend to seek consistency between beliefs, attitudes, and behaviors. Inconsistency among these components leads to cognitive dissonance, creating psychological discomfort. Thus, this theory provides insights into how Task Specific Knowledge can influence the Fraud Detection process conducted by auditors.</p><p>Attribution theory, first proposed by <xref ref-type="bibr" rid="BIBR-33">[33]</xref>, addresses how individuals explain the causes of behavior and events. According to Fiske &amp; <xref ref-type="bibr" rid="BIBR-34">[34]</xref>, this theory discusses how social perception is used to make causal explanations about events. Its assumption is that individuals tend to explain behavior, whether their own or others', by attributing causes to internal or external factors, known as dispositional and situational attributions. Thus, this theory provides insights into how Auditor Religiosity can influence the Fraud Detection process. The way auditors interpret suspicious behavior will be influenced by religious values, which are dispositional attributions.</p><p>According to <xref ref-type="bibr" rid="BIBR-35">[35]</xref>, fraud is defined as an unlawful act that can be committed by individuals, both internal and external to an organization, with the motive of personal or group gain, ultimately resulting in direct losses to others. In efforts to enhance performance and reputation, organizations may resort to illegal actions, disregarding the consequences and parties affected by their actions. Detection, as per the <xref ref-type="bibr" rid="BIBR-36">[36]</xref>, refers to the effort to discover and determine facts, assumptions, or the existence of something. <xref ref-type="bibr" rid="BIBR-37">[37]</xref> defines Fraud Detection as a process of identifying the occurrence of fraud, its perpetrators, victims, and the reasons behind the incidents.</p><p>According to <xref ref-type="bibr" rid="BIBR-2">[2]</xref>, religiosity is defined as the level of conception about religion and the level of commitment in religious practices. Similarly<xref ref-type="bibr" rid="BIBR-3">[3]</xref> explain that conception refers to an individual's understanding of their religious aspects, while commitment level relates to a comprehensive understanding in religious life. Hence, it can be concluded that individuals adopt different approaches to express and embody their religiosity. Individuals with high religiosity tend to exhibit strict moral standards and strong work ethics, thus being better able to identify fraudulent actions. <xref ref-type="bibr" rid="BIBR-38">[38]</xref> elucidate that religion has a binding nature, implying rules and responsibilities to be adhered to by its followers.<xref ref-type="bibr" rid="BIBR-12">[12]</xref> explains that high religiosity can enhance an auditor's independence as they tend to uphold truth and justice steadfastly.</p><p>According to <xref ref-type="bibr" rid="BIBR-4">[4]</xref>, CAATs are the utilization of various tools, technologies, and software to assist auditors in performing various audit tasks, including control testing, confirmation, financial statement data analysis, as well as continuous auditing and monitoring. As per Auditing Standard Section 327 in computerized accounting information systems environments, manual testing is impractical for auditors. Therefore, computer-assisted audit techniques, or CAATs, are necessary to enhance auditor performance and efficiency and improve Fraud Detection effectiveness. <xref ref-type="bibr" rid="BIBR-40">[40]</xref> emphasize that CAATs enrich the audit process through technology utilization, employing specialized software that enables auditors to achieve audit objectives more efficiently.</p><p>According to <xref ref-type="bibr" rid="BIBR-6">[6]</xref>, Task Specific Knowledge refers to information stored in memory, including experiences, practical facts, and theoretical concepts related to audit tasks, especially in evaluation and assessment processes. This information encompasses general and specific knowledge relevant to audit tasks. <xref ref-type="bibr" rid="BIBR-25">[25]</xref> states that Task Specific Knowledge assists auditors in understanding the audited environment and internal conditions, facilitating structured planning and execution of audit procedures. During audits, Task Specific Knowledge aids auditors in completing tasks more effectively, enhancing the quality of their assessments. <xref ref-type="bibr" rid="BIBR-41">[41]</xref> assert that the success of organizational audits in uncovering fraud, along with auditors' audit experience, is a significant element in potential Fraud Detection in each audit cycle and comprehensive risk assessment.</p><p>According to <xref ref-type="bibr" rid="BIBR-42">[42]</xref>, Big Data refers to a vast collection of data with complex and varied structures. <xref ref-type="bibr" rid="BIBR-8">[8]</xref> assert that Big Data has significant potential in enhancing forensic audit functions for Fraud Detection. <xref ref-type="bibr" rid="BIBR-10">[10]</xref> cites one of the benefits of Big Data as its ability to assist companies in identifying fraud risks. Consequently, Big Data can support internal auditors in detecting fraud by expanding the coverage of essential data sources. This enables better analytical processes, ultimately enhancing the audit quality in identifying fraudulent activities.</p><sec><title>1. The Influence of Auditor Religiosity on Fraud Detection</title><p>According to <xref ref-type="bibr" rid="BIBR-2">[2]</xref>, religiosity is defined as the level of one's conception of their religion and the degree of commitment they have in religious practices. Similarly, <xref ref-type="bibr" rid="BIBR-3">[3]</xref> explain that the concept of conception refers to an individual's understanding of the aspects of their religion, while the level of commitment is related to a comprehensive understanding in religious life. Research conducted by <xref ref-type="bibr" rid="BIBR-9">[9]</xref> dan <xref ref-type="bibr" rid="BIBR-10">[10]</xref> indicate that there is an influence of religiosity on the detection of fraud by auditors. These findings align with a study by <xref ref-type="bibr" rid="BIBR-11">[11]</xref> which demonstrates that religiosity significantly affects auditors' ability to detect fraud. However, there is research with contrasting results to the aforementioned studies, such as the study conducted by <xref ref-type="bibr" rid="BIBR-12">[12]</xref> which shows that religiosity does not influence the internal auditors' ability to detect fraud. Based on the above review, the researcher proposes a hypothesis:</p><p>H1a: Auditor Religiosity has a significant influence on Fraud Detection</p></sec><sec><title>2. The Influence of Computer Assisted Audit Techniques on Fraud Detection</title><p>CAATs, as defined by <xref ref-type="bibr" rid="BIBR-43">[43]</xref>, are approaches that facilitate auditing processes using computers and related technologies. <xref ref-type="bibr" rid="BIBR-44">[44]</xref> define CAATs as crucial tools that automate and audit audit data. The use of CAATs has transformed the auditing approach paradigm in Fraud Detection in the information technology era. CAATs provide auditors with the ability to delve deeper into data, analyze suspicious patterns and trends, and detect fraud indicators that are difficult to find manually. Research by <xref ref-type="bibr" rid="BIBR-13">[13]</xref>, <xref ref-type="bibr" rid="BIBR-14">[14]</xref>, <xref ref-type="bibr" rid="BIBR-15">[15]</xref>, dan <xref ref-type="bibr" rid="BIBR-16">[16]</xref> proves that CAATs have a significant impact on Fraud Detection. This study, supported by research by <xref ref-type="bibr" rid="BIBR-17">[17]</xref>, uses a qualitative approach and shows that the implementation of CAATs plays a crucial role in the audit process and provides benefits to audit results in detecting fraud. However, research by <xref ref-type="bibr" rid="BIBR-19">[19]</xref> dan <xref ref-type="bibr" rid="BIBR-18">[18]</xref> shows that the use of information technology has no effect on Fraud Detection by auditors. Based on this, auditors using CAATs as tools in the audit process will find it easier to identify existing anomalies, ultimately improving their examination results. Based on the above review, the researcher proposes a hypothesis:</p><p>H1b: Computer Assisted Audit Techniques has a significant influence on Fraud Detection</p></sec><sec><title>3. The Influence of Task Specific Knowledge on the Fraud Detection</title><p>Task Specific Knowledge, according to <xref ref-type="bibr" rid="BIBR-6">[6]</xref>, refers to information stored in memory, including experience, practical facts, and theoretical concepts related to the performance of audit tasks, particularly in the evaluation and assessment process. This information encompasses general knowledge and more specific knowledge relevant to audit tasks. According to<xref ref-type="bibr" rid="BIBR-25">[25]</xref>, Task Specific Knowledge can help auditors gain a deeper understanding of the audited environment and internal conditions, facilitating more structured audit planning and execution. During the audit process, Task Specific Knowledge assists auditors in understanding and completing audit tasks, enhancing the quality of their assessments. Research by <xref ref-type="bibr" rid="BIBR-20">[20]</xref>, Betri &amp; Kusumawaty (2019), <xref ref-type="bibr" rid="BIBR-22">[22]</xref> indicates that Task Specific Knowledge influences Fraud Detection by auditors. This research is supported by studies by <xref ref-type="bibr" rid="BIBR-23">[23]</xref>, <xref ref-type="bibr" rid="BIBR-24">[24]</xref>, <xref ref-type="bibr" rid="BIBR-25">[25]</xref>, dan <xref ref-type="bibr" rid="BIBR-26">[26]</xref>, which show that Task Specific Knowledge affects auditors' ability to detect fraud. Task Specific Knowledge enhances auditors' abilities during the audit process to detect fraud, facilitates more structured audit planning and execution, and assists auditors in understanding and completing audit tasks, thereby improving the quality of their assessments. Based on the above review, the researcher proposes a hypothesis:</p><p>H1c: Task Specific Knowledge has a significant influence on Fraud Detect</p></sec><sec><title>4. The Influence of Auditor Religiosity on Fraud Detection with Big Data As a Moderating Variable</title><p>Religiosity, as defined by <xref ref-type="bibr" rid="BIBR-45">[45]</xref>, reflects the internalization of religious values through adherence to and comprehension of religious teachings, manifested in everyday behavior. Additionally, Big Data, as elucidated by <xref ref-type="bibr" rid="BIBR-42">[42]</xref>, refers to vast collections of data characterized by complex and varied structures. <xref ref-type="bibr" rid="BIBR-46">[46]</xref> underscores the potential of Big Data in expediting fraud investigation through data integration. Both Religiosity and Big Data influence the Fraud Detection process. Big data reinforces the influence of auditor religiosity by providing broader access to relevant data, enabling auditors to trace suspicious transactions that may contravene ethical or integrity principles. Previous research conducted by <xref ref-type="bibr" rid="BIBR-27">[27]</xref>, <xref ref-type="bibr" rid="BIBR-28">[28]</xref>, <xref ref-type="bibr" rid="BIBR-10">[10]</xref>, dan <xref ref-type="bibr" rid="BIBR-29">[29]</xref> has demonstrated that Big Data exerts an influence on Fraud Detection. The findings of this study indicate that the utilization of Big Data plays a significant role in the Fraud Detection process. However, contrary to the findings of research conducted by <xref ref-type="bibr" rid="BIBR-30">[30]</xref>, which suggest that Big Data does not influence Fraud Detection. Based on the above review, the researcher proposes a hypothesis:</p><p>H2a: Big Data Moderates the Influence of Auditor Religiosity on Fraud Detection</p></sec><sec><title>5. The Influence of Computer Assisted Audit Techniques on Fraud Detection with Big Data As a Moderating Variable</title><p>The utilization of Computer Assisted Audit Techniques (CAATs) has become crucial in enhancing the efficiency and effectiveness of audit processes. <xref ref-type="bibr" rid="BIBR-40">[40]</xref> elucidate that CAATs enrich the audit process through the utilization of specialized technology that empowers auditors to attain audit objectives. According to<xref ref-type="bibr" rid="BIBR-44">[44]</xref>, CAATs play a significant role in automating and auditing audit data. Conversely, <xref ref-type="bibr" rid="BIBR-42">[42]</xref> refer to large, complex, and varied datasets. <xref ref-type="bibr" rid="BIBR-46">[46]</xref> highlights the potential of Big Data in expediting fraud investigations through data integration. Big Data can moderate the influence of Computer Assisted Audit Techniques on Fraud Detection by strengthening or weakening the relationship between the two. CAATs are tools and techniques used by auditors to analyze data automatically and identify potential fraud or anomalies. In the context of big data, CAATs become more effective as they can process large volumes of data quickly and accurately. By harnessing big data, auditors can integrate CAATs into their audit processes to identify suspicious patterns or trends that may go undetected manually. Previous research conducted by <xref ref-type="bibr" rid="BIBR-27">[27]</xref> <xref ref-type="bibr" rid="BIBR-28">[28]</xref>, <xref ref-type="bibr" rid="BIBR-10">[10]</xref>, dan <xref ref-type="bibr" rid="BIBR-29">[29]</xref> has shown that Big Data influences Fraud Detection. The findings of this research indicate that the utilization of Big Data plays a crucial role in the Fraud Detection process. However, contrary to the results of research conducted by <xref ref-type="bibr" rid="BIBR-30">[30]</xref>, which show that Big Data does not have an influence on Fraud Detection. Based on the above review, the researcher proposes a hypothesis:</p><p>H2b: Auditor Religiosity Moderates the Influence of Computer Assisted Audit Techniques on Fraud Detection</p></sec><sec><title>6. The Influence of Task Specific Knowledge on the Fraud Detection with Big Data As a Moderating Variable</title><p>Task Specific Knowledge, as elucidated by Sari (2019) and <xref ref-type="bibr" rid="BIBR-6">[6]</xref>, refers to a specialized understanding of specific tasks, particularly within the context of audit tasks. This knowledge assists auditors in comprehending the environment and internal conditions of the audited entity, enabling them to plan and execute more directed audit procedures. Conversely, <xref ref-type="bibr" rid="BIBR-42">[42]</xref> refer to a large dataset that exhibits complex and varied structures. <xref ref-type="bibr" rid="BIBR-46">[46]</xref> highlights the potential of Big Data in expediting fraud investigations through data integration. Big Data can moderate the influence of Task Specific Knowledge on Fraud Detection by reinforcing or attenuating the relationship between them. Task specific knowledge entails the auditor's understanding of the industry, business, or processes being audited. Big data can enhance the influence of task-specific knowledge by providing broader access to relevant industry and business data. Auditors with robust task-specific knowledge can utilize big data to identify patterns or trends in data that may indicate fraud. Previous research conducted by <xref ref-type="bibr" rid="BIBR-27">[27]</xref>, <xref ref-type="bibr" rid="BIBR-28">[28]</xref>, <xref ref-type="bibr" rid="BIBR-10">[10]</xref>, dan <xref ref-type="bibr" rid="BIBR-29">[29]</xref> has demonstrated that Big Data influences Fraud Detection. These research findings indicate that the utilization of Big Data plays a crucial role in the Fraud Detection process. However, in contrast to the findings of <xref ref-type="bibr" rid="BIBR-17">[17]</xref>, which indicate that Big Data has no influence on Fraud Detection. Based on the above review, the researcher proposes a hypothesis:</p><p>H2c: Big Data Moderates the Influence of Task Specific Knowledge on Fraud Detection</p></sec></sec><sec><title>Research methods</title><p>This study employs an associative causal research design to investigate the impact of Auditor Religiosity, Computer Assisted Audit Techniques (CAATs), and Task Specific Knowledge on Fraud Detection, with Big Data acting as a moderating variable. Primary data were collected via questionnaires distributed to the Representative Offices of the State Development Audit Agency (BPKP) in Sumatera. The study's population consists of 876 auditors, with a sample size of 276 auditors determined using Slovin's formula at a 5% significance level, through probability sampling with simple random sampling methods.</p><p>The research adopts a Structural Equation Modeling (SEM) approach, utilizing Partial Least Squares (PLS) methodology via Smart PLS 4 software. This choice is made over Covariance-Based SEM (CB SEM) methods, such as AMOS or LISREL, due to several considerations. The dataset’s non-normal distribution aligns with PLS SEM’s robustness to deviations from normality, whereas CB SEM requires stricter assumptions. Additionally, the complex model, involving multiple variables and interaction effects, is better suited for PLS SEM, which can manage intricate models with latent variables and smaller sample sizes effectively. Although CB SEM could yield comparable results with larger datasets, PLS SEM’s flexibility and efficiency align better with the research's objectives and constraints.</p><p>In summary, employing Smart PLS 4 for SEM analysis ensures rigorous evaluation of both the outer and inner models. This includes assessments of convergent validity, discriminant validity, and internal consistency reliability, as well as analyses of R Square, effect sizes (F Square), Q Square, and significance testing (t-tests and MRA). This methodological choice supports the robustness and validity of the study’s findings, adhering to best practices in empirical auditing research.</p></sec><sec><title>Results and Discussion</title><p>The characteristics of the respondents in this study consist of gender, age, highest education level, functional auditor position (JFA), and length of employment. There were 120 male respondents (54.55%) and 100 female respondents (45.45%). The majority of respondents were aged between 21 and 40 years, with the highest number in the age range of 31-40 years (34.09%). In terms of highest education level, most respondents had a D4/S1 educational background (68.18%), followed by D3 (20.91%) and S2 (10.91%). The most common functional auditor position was Auditor Pertama (29.09%) and Auditor Muda (28.64%). The majority of respondents (61.82%) had been employed for more than 10 years.</p><table-wrap id="table-1" ignoredToc=""><label>Table 1</label><caption><p>Statistics Descriptive</p></caption><table frame="box" rules="all"><thead><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">Variables</th><th colspan="2" rowspan="1" style="" align="center" valign="top">Theoritical</th><th colspan="2" rowspan="1" style="" align="center" valign="top">Actually</th><th colspan="1" rowspan="2" style="" align="center" valign="middle">Std</th></tr></thead><tbody><tr><td colspan="1" rowspan="1" style="" align="center" valign="top"/><td colspan="1" rowspan="1" style="" align="center" valign="top">Range</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Median</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Range</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Mean</td></tr><tr><td colspan="1" rowspan="1" style="" align="center" valign="top">AR</td><td colspan="1" rowspan="1" style="" align="center" valign="top">6 to 30</td><td colspan="1" rowspan="1" style="" align="center" valign="top">18</td><td colspan="1" rowspan="1" style="" align="center" valign="top">9 to 30</td><td colspan="1" rowspan="1" style="" align="center" valign="top">26.03</td><td colspan="1" rowspan="1" style="" align="center" valign="top">3.37</td></tr><tr><td colspan="1" rowspan="1" style="" align="center" valign="top">CAATs</td><td colspan="1" rowspan="1" style="" align="center" valign="top">17 to 85</td><td colspan="1" rowspan="1" style="" align="center" valign="top">51</td><td colspan="1" rowspan="1" style="" align="center" valign="top">38 to 85</td><td colspan="1" rowspan="1" style="" align="center" valign="top">70.32</td><td colspan="1" rowspan="1" style="" align="center" valign="top">9.26</td></tr><tr><td colspan="1" rowspan="1" style="" align="center" valign="top">TSK</td><td colspan="1" rowspan="1" style="" align="center" valign="top">14 to 70</td><td colspan="1" rowspan="1" style="" align="center" valign="top">42</td><td colspan="1" rowspan="1" style="" align="center" valign="top">14 to 70</td><td colspan="1" rowspan="1" style="" align="center" valign="top">61.63</td><td colspan="1" rowspan="1" style="" align="center" valign="top">7.98</td></tr><tr><td colspan="1" rowspan="1" style="" align="center" valign="top">BD</td><td colspan="1" rowspan="1" style="" align="center" valign="top">18 to 90</td><td colspan="1" rowspan="1" style="" align="center" valign="top">54</td><td colspan="1" rowspan="1" style="" align="center" valign="top">32 to 89</td><td colspan="1" rowspan="1" style="" align="center" valign="top">68.92</td><td colspan="1" rowspan="1" style="" align="center" valign="top">8.40</td></tr><tr><td colspan="1" rowspan="1" style="" align="center" valign="top">FD</td><td colspan="1" rowspan="1" style="" align="center" valign="top">11 to 55</td><td colspan="1" rowspan="1" style="" align="center" valign="top">33</td><td colspan="1" rowspan="1" style="" align="center" valign="top">22 to 55</td><td colspan="1" rowspan="1" style="" align="center" valign="top">48.75</td><td colspan="1" rowspan="1" style="" align="center" valign="top">6.16</td></tr></tbody></table><table-wrap-foot><p>Source: Primary Data Processed, 2024</p></table-wrap-foot></table-wrap><p>Based on the table above, the average score of respondents regarding the indicators of the Auditor Religiosity construct reaches 26.03, which significantly exceeds the theoretical median value of 18. These results indicate that the majority of respondents have a significant level of religiosity, exceeding the median value used as a benchmark in the theoretical range. Similarly, the average score of respondents regarding the indicators of the Computer Assisted Audit Techniques construct reaches 70.32, which significantly exceeds the theoretical median value of 51. These results indicate that the majority of respondents have a much higher perception regarding the Computer Assisted Audit Techniques construct in the audit process compared to the theoretical median value. Furthermore, the average score of respondents regarding the indicators of the Task Specific Knowledge construct reaches 61.63, which significantly exceeds the theoretical median value of 42. This finding indicates that the majority of respondents have adequate knowledge to handle audit tasks. Additionally, the descriptive statistical test results indicate that the average score of respondents regarding the indicators of the Big Data construct reaches 68.92, which significantly exceeds the theoretical median value of 54. This indicates that the majority of respondents have a higher perception regarding the Big Data construct. Finally, the average score of respondents regarding the indicators of the Fraud Detection construct reaches 48.75, which significantly exceeds the theoretical median value of 33. This finding indicates that the majority of respondents have a high awareness and ability in Fraud Detection.</p><sec><title>OUTER MODEL</title><p>The initial results of the outer model analysis include a comprehensive evaluation of the validity and reliability of constructs.</p><fig id="figure-1" ignoredToc=""><label>Figure 1</label><caption><p>The Initial Measurement Model</p></caption><p>Source: Primary Data Processed, 2024</p><graphic xlink:href="https://journals2.ums.ac.id/reaksi/article/download/6424/3608/43304" mimetype="image" mime-subtype="png"><alt-text>Image</alt-text></graphic></fig><p>Based on the outer model above, it can be observed that all outer loading values of those indicators exceed the threshold of 0.708. Additionally, the Average Variance Extracted (AVE) values also surpass 0.50, indicating that all indicators meet the validity criteria. All outer loading values on the manifest variables to the dimensional constructs, as well as the outer loading values from the dimensional constructs to the Auditor Religiosity variable, all exceed 0.708. The AVE calculated for each dimensional construct and the Auditor Religiosity variable also exceed the threshold of 0.50, indicating convergent validity on the Auditor Religiosity variable and its manifestations.</p><table-wrap id="table-2" ignoredToc=""><label>Table 2</label><caption><p>Correlation Values Among Construct Dimensions, AVE, CR, and CA</p></caption><table frame="box" rules="all"><thead><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">Indicator</th><th colspan="1" rowspan="1" style="" align="center" valign="top">INA</th><th colspan="1" rowspan="1" style="" align="center" valign="top">KPA</th><th colspan="1" rowspan="1" style="" align="center" valign="top">KK</th><th colspan="1" rowspan="1" style="" align="center" valign="top">AVE</th><th colspan="1" rowspan="1" style="" align="center" valign="top">Composite Reliability</th><th colspan="1" rowspan="1" style="" align="center" valign="top">Cronbach's Alpha</th></tr></thead><tbody><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">IIA</th><td colspan="1" rowspan="1" style="" align="center" valign="top">1</td><td colspan="1" rowspan="1" style="" align="center" valign="top"/><td colspan="1" rowspan="1" style="" align="center" valign="top"/><td colspan="1" rowspan="1" style="" align="center" valign="top">0.923</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.960</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.916</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">KPA</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.703</td><td colspan="1" rowspan="1" style="" align="center" valign="top">1</td><td colspan="1" rowspan="1" style="" align="center" valign="top"/><td colspan="1" rowspan="1" style="" align="center" valign="top">0.907</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.951</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.898</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">KK</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.646</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.758</td><td colspan="1" rowspan="1" style="" align="center" valign="top">1</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.775</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.873</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.715</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">SR of AVE</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.961</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.952</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.88</td><td colspan="1" rowspan="1" style="" align="center" valign="top"/><td colspan="1" rowspan="1" style="" align="center" valign="top"/><td colspan="1" rowspan="1" style="" align="center" valign="top"/></tr></tbody></table><table-wrap-foot><p>Source: Primary Data Processed, 2024</p></table-wrap-foot></table-wrap><p>Furthermore, the <xref ref-type="bibr" rid="BIBR-47">[47]</xref> criteria test revealed that each correlation between latent variables resulted in values lower than the square root of the Average Variance Extracted (AVE) of each related construct. Therefore, it is concluded that the Religiosity Auditor latent variable meets the criteria for discriminant validity.</p><table-wrap id="table-3" ignoredToc=""><label>Table 3</label><caption><p>Cross Loading</p></caption><table frame="box" rules="all"><thead><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">Indicator</th><th colspan="1" rowspan="1" style="" align="center" valign="top">INA</th><th colspan="1" rowspan="1" style="" align="center" valign="top">KKK</th><th colspan="1" rowspan="1" style="" align="center" valign="top">KPA</th><th colspan="1" rowspan="1" style="" align="center" valign="top">Description</th></tr></thead><tbody><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">RA_1</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.961</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.627</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.691</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Valid</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">RA_2</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.960</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.613</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.659</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Valid</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">RA_3</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.708</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.917</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.758</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Valid</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">RA_4</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.386</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.842</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.554</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Valid</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">RA_5</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.703</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.705</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.953</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Valid</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">RA_6</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.635</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.740</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.952</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Valid</td></tr></tbody></table><table-wrap-foot><p>Source: Primary Data Processed, 2024</p></table-wrap-foot></table-wrap><p>The subsequent test, comparing the outer loading and cross-loading values, found that each outer loading value of the indicators on the respective constructs consistently exceeded all cross-loading values from other constructs. This indicates that discriminant validity on the Religiosity Auditor variable has been met. The final test regarding internal consistency reliability showed that the Cronbach’s Alpha values for each dimensional construct revealed numbers above 0.70, while the Composite Reliability values for each dimensional construct also exceeded 0.708. Therefore, it can be acknowledged that the Religiosity Auditor variable and its manifestations demonstrate an adequate level of reliability. By evaluating the outer model measurement on the Religiosity Auditor latent variable, it can be concluded that all dimensional constructs and Religiosity Auditor variables show a level of validity and reliability that meets the rule of thumb criteria.</p><fig id="figure-2" ignoredToc=""><label>Figure 2</label><caption><p>The Initial Measurement Model</p></caption><p>Source: Primary Data Processed, 2024</p><graphic xlink:href="https://journals2.ums.ac.id/reaksi/article/download/6424/3608/43305" mimetype="image" mime-subtype="png"><alt-text>Image</alt-text></graphic></fig><p>Based on the above outer model, it can be observed that all outer loading values of the indicators exceed the threshold of 0.708. Additionally, the Average Variance Extracted (AVE) values also surpass 0.50, indicating that all indicators can be considered to meet the validity requirements. All outer loading values on the manifest variables to the dimensional constructs, as well as the outer loading values from the dimensional constructs to the CAATs variable, all exceed the threshold of 0.708. The calculated AVE for each dimensional construct and the CAATs variable also exceeds the threshold of 0.50, depicting the fulfillment of convergent validity on the CAATs variable and its manifestations.</p><table-wrap id="table-4" ignoredToc=""><label>Table 4</label><caption><p>Correlation Values Among Construct Dimensions</p></caption><table frame="box" rules="all"><thead><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">Construct</th><th colspan="1" rowspan="1" style="" align="center" valign="top">AC</th><th colspan="1" rowspan="1" style="" align="center" valign="top">ATU</th><th colspan="1" rowspan="1" style="" align="center" valign="top">PEU</th><th colspan="1" rowspan="1" style="" align="center" valign="top">PU</th></tr></thead><tbody><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">AC</th><td colspan="1" rowspan="1" style="" align="center" valign="top">1</td><td colspan="1" rowspan="1" style="" align="center" valign="top"/><td colspan="1" rowspan="1" style="" align="center" valign="top"/><td colspan="1" rowspan="1" style="" align="center" valign="top"/></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">ATU</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.896</td><td colspan="1" rowspan="1" style="" align="center" valign="top">1</td><td colspan="1" rowspan="1" style="" align="center" valign="top"/><td colspan="1" rowspan="1" style="" align="center" valign="top"/></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">PEU</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.796</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.780</td><td colspan="1" rowspan="1" style="" align="center" valign="top">1</td><td colspan="1" rowspan="1" style="" align="center" valign="top"/></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">PU</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.797</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.780</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.840</td><td colspan="1" rowspan="1" style="" align="center" valign="top">1</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">SR of AVE</th><td colspan="1" rowspan="1" style="" align="center" valign="top">1</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.957</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.842</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.859</td></tr></tbody></table><table-wrap-foot><p>Source: Primary Data Processed, 2024</p></table-wrap-foot></table-wrap><p>Furthermore, in the <xref ref-type="bibr" rid="BIBR-47">[47]</xref> criteria test, there was a redundancy issue where the correlation value between indicators, thus it was concluded that the square root value of the AVE of the PEU construct was smaller than the correlation value between latent constructs, which was the most significant value of 0.860 &lt; 0.901. This indicates that the Computer Assisted Audit Techniques latent variable does not meet the discriminant validity criteria. Therefore, the step taken to address this issue is to remove indicators that have high correlations with other indicators measuring different dimensions. After that, a revision was made, so there was a total of 1 model revision resulting in 2 tests. With the first revision model being the final model as convergent validity, discriminant validity, and internal consistency reliability have been met. Below are the details of the final model:</p><fig id="figure-3" ignoredToc=""><label>Figure 3</label><caption><p>The Final Measurement Model</p></caption><p>Source: Primary Data Processed, 2024</p><graphic xlink:href="https://journals2.ums.ac.id/reaksi/article/download/6424/3608/43306" mimetype="image" mime-subtype="png"><alt-text>Image</alt-text></graphic></fig><p>The results of the revision on the measurement instrument of CAATs variable yielded parameter estimations that attained validity and reliability levels meeting the rule of thumb standard. All outer loading values on the manifest variables to the dimensional constructs, as well as the outer loading values from the dimensional constructs to the CAATs variable, exceeded the threshold of 0.708.</p><table-wrap id="table-5" ignoredToc=""><label>Table 5</label><caption><p>Correlation Values Among Construct Dimensions, AVE, CR, and CA</p></caption><table frame="box" rules="all"><thead><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">Construct</th><th colspan="1" rowspan="1" style="" align="center" valign="top">AC</th><th colspan="1" rowspan="1" style="" align="center" valign="top">ATU</th><th colspan="1" rowspan="1" style="" align="center" valign="top">PEU</th><th colspan="1" rowspan="1" style="" align="center" valign="top">PU</th><th colspan="1" rowspan="1" style="" align="center" valign="top">AVE</th><th colspan="1" rowspan="1" style="" align="center" valign="top">Composite Reliability</th><th colspan="1" rowspan="1" style="" align="center" valign="top">Cronbach's Alpha</th></tr></thead><tbody><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">AC</th><td colspan="1" rowspan="1" style="" align="center" valign="top">1</td><td colspan="1" rowspan="1" style="" align="center" valign="top"/><td colspan="1" rowspan="1" style="" align="center" valign="top"/><td colspan="1" rowspan="1" style="" align="center" valign="top"/><td colspan="1" rowspan="1" style="" align="center" valign="top">1</td><td colspan="1" rowspan="1" style="" align="center" valign="top">1</td><td colspan="1" rowspan="1" style="" align="center" valign="top">1</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">ATU</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.896</td><td colspan="1" rowspan="1" style="" align="center" valign="top">1</td><td colspan="1" rowspan="1" style="" align="center" valign="top"/><td colspan="1" rowspan="1" style="" align="center" valign="top"/><td colspan="1" rowspan="1" style="" align="center" valign="top">0.915</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.956</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.908</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">PEU</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.796</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.780</td><td colspan="1" rowspan="1" style="" align="center" valign="top">1</td><td colspan="1" rowspan="1" style="" align="center" valign="top"/><td colspan="1" rowspan="1" style="" align="center" valign="top">0.709</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.924</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.896</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">PU</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.797</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.780</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.840</td><td colspan="1" rowspan="1" style="" align="center" valign="top">1</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.738</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.944</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.928</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">SR of AVE</th><td colspan="1" rowspan="1" style="" align="center" valign="top">1</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.957</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.842</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.859</td><td colspan="1" rowspan="1" style="" align="center" valign="top"/><td colspan="1" rowspan="1" style="" align="center" valign="top"/><td colspan="1" rowspan="1" style="" align="center" valign="top"/></tr></tbody></table><table-wrap-foot><p>Source: Primary Data Processed, 2024</p></table-wrap-foot></table-wrap><p>Additionally, the Average Variance Extracted (AVE) values calculated for each dimensional construct and the CAATs variable also surpassed the threshold of 0.50, indicating that convergent validity on the CAATs variable and its manifestations has been fulfilled. Furthermore, in the Fornell &amp; Larcker (1981) criteria test, it was revealed that each correlation between latent variables resulted in values lower than the square root of the Average Variance Extracted (AVE) of the respective related constructs. Therefore, it was concluded that the CAATs latent variable meets the criteria for discriminant validity.</p><table-wrap id="table-6" ignoredToc=""><label>Table 6</label><caption><p>Cross Loading</p></caption><table frame="box" rules="all"><thead><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">Indicator</th><th colspan="1" rowspan="1" style="" align="center" valign="top">PU</th><th colspan="1" rowspan="1" style="" align="center" valign="top">PEU</th><th colspan="1" rowspan="1" style="" align="center" valign="top">ATU</th><th colspan="1" rowspan="1" style="" align="center" valign="top">AC</th><th colspan="1" rowspan="1" style="" align="center" valign="top">Description</th></tr></thead><tbody><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">CAATs_1</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.842</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.660</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.657</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.622</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Valid</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">CAATs_2</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.763</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.645</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.525</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.543</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Valid</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">CAATs_3</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.917</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.795</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.740</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.718</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Valid</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">CAATs_4</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.890</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.738</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.720</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.784</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Valid</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">CAATs_5</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.896</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.777</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.706</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.753</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Valid</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">CAATs_6</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.836</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.699</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.653</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.665</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Valid</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">CAATs_7</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.666</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.776</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.584</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.618</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Valid</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">CAATs_8</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.749</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.902</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.695</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.698</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Valid</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">CAATs_9</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.795</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.894</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.797</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.774</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Valid</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">CAATs_12</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.702</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.869</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.681</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.705</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Valid</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">CAATs_13</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.608</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.758</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.490</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.529</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Valid</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">CAATs_14</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.772</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.784</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.96</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.867</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Valid</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">CAATs_15</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.720</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.706</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.954</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.848</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Valid</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">CAATs_17</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.797</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.796</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.896</td><td colspan="1" rowspan="1" style="" align="center" valign="top">1</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Valid</td></tr></tbody></table><table-wrap-foot><p>Source: Primary Data Processed, 2024</p></table-wrap-foot></table-wrap><p>The subsequent test involved comparing the outer loading values and cross-loading, where it was found that each indicator's outer loading value consistently surpassed all cross-loading values from other constructs. This indicates that discriminant validity on the CAATs variable has been met. The final test was internal consistency reliability. Referring to the data listed in the table, it can be observed that the Cronbach’s Alpha values for each dimensional construct exceed 0.70, while the Composite Reliability values for each dimensional construct also exceed 0.708. Therefore, it can be acknowledged that the CAATs variable and its manifestations exhibit an adequate level of reliability. By evaluating the outer model measurement on the CAATs latent variable, which has been revised once, it can be concluded that all dimensional constructs and CAATs variables in the first revision demonstrate validity and reliability levels that meet the rule of thumb criteria.</p><fig id="figure-4" ignoredToc=""><label>Figure 4</label><caption><p>The Initial Measurement Model</p></caption><p>Source: Primary Data Processed, 2024</p><graphic xlink:href="https://journals2.ums.ac.id/reaksi/article/download/6424/3608/43307" mimetype="image" mime-subtype="png"><alt-text>Image</alt-text></graphic></fig><p>Based on the outer model above, it can be observed that all the outer loading values of those indicators surpass the threshold of 0.708. Additionally, the Average Variance Extracted (AVE) values also exceed 0.50, indicating that all the indicators can be considered to meet the validity requirements. All the outer loading values on the manifest variables to the dimensional constructs, as well as the outer loading values from the dimensional constructs to the task specific knowledge variable, all exceed the value of 0.708. The calculated AVE for each dimensional construct and the task specific knowledge variable also surpass the threshold of 0.50, depicting the fulfillment of convergent validity on the task specific knowledge variable and its manifestations.</p><table-wrap id="table-7" ignoredToc=""><label>Table 7</label><caption><p>Correlation Values Among Construct Dimensions</p></caption><table frame="box" rules="all"><thead><tr><th colspan="1" rowspan="1" style="" align="left" valign="top">Construct</th><th colspan="1" rowspan="1" style="" align="left" valign="top">Auditor Capacity</th><th colspan="1" rowspan="1" style="" align="left" valign="top">Technical Knowledge</th></tr></thead><tbody><tr><th colspan="1" rowspan="1" style="" align="left" valign="top">Auditor Capacity</th><td colspan="1" rowspan="1" style="" align="left" valign="top">1</td><td colspan="1" rowspan="1" style="" align="left" valign="top"/></tr><tr><th colspan="1" rowspan="1" style="" align="left" valign="top">Technical knowledge</th><td colspan="1" rowspan="1" style="" align="left" valign="top">0.946</td><td colspan="1" rowspan="1" style="" align="left" valign="top">1</td></tr><tr><th colspan="1" rowspan="1" style="" align="left" valign="top">SR of AVE</th><td colspan="1" rowspan="1" style="" align="left" valign="top">0.893</td><td colspan="1" rowspan="1" style="" align="left" valign="top">0.876</td></tr></tbody></table><table-wrap-foot><p>Source: Primary Data Processed, 2024</p></table-wrap-foot></table-wrap><p>Furthermore, in the <xref ref-type="bibr" rid="BIBR-47">[47]</xref> criteria test, there was redundancy issue where the correlation values between indicators. It was concluded that all correlation values between latent constructs were greater than the square root of the AVE of each related construct. This indicates that the Task Specific Knowledge latent variable does not meet the criteria for discriminant validity. Therefore, the step taken to address this issue was to remove indicators with high correlations with other indicators measuring different dimensions. After that, a revision was made, resulting in a total of 1 model revision, thus there were 2 rounds of testing. The first revision model is considered the final model because convergent validity, discriminant validity, and internal consistency reliability have been met. Below are the details of the final model:</p><fig id="figure-5" ignoredToc=""><label>Figure 5</label><caption><p>The Final Measurement Model</p></caption><p>Source: Primary Data Processed, 2024</p><graphic xlink:href="https://journals2.ums.ac.id/reaksi/article/download/6424/3608/43308" mimetype="image" mime-subtype="png"><alt-text>Image</alt-text></graphic></fig><p>The revision results on the instrument measuring the Task Specific Knowledge variable yielded parameter estimates that met the validity and reliability standards according to the rule of thumb. All outer loading values on the manifest variables to the dimensional constructs, as well as the outer loading values from the dimensional constructs to the Task Specific Knowledge variable, exceeded the threshold of 0.708.</p><table-wrap id="table-8" ignoredToc=""><label>Table 8</label><caption><p>Correlation Values Among Construct Dimensions, AVE, CR, and CA</p></caption><table frame="box" rules="all"><thead><tr><th colspan="1" rowspan="1" style="" align="center" valign="top"><p>Construct</p></th><th colspan="1" rowspan="1" style="" align="center" valign="top"><p>AC</p></th><th colspan="1" rowspan="1" style="" align="center" valign="top"><p>TK</p></th><th colspan="1" rowspan="1" style="" align="center" valign="top"><p>AVE</p></th><th colspan="1" rowspan="1" style="" align="center" valign="top"><p>Composite Reliability</p></th><th colspan="1" rowspan="1" style="" align="center" valign="top"><p>Cronbach's Alpha</p></th></tr></thead><tbody><tr><th colspan="1" rowspan="1" style="" align="center" valign="top"><p>KA</p></th><td colspan="1" rowspan="1" style="" align="center" valign="top"><p>1</p></td><td colspan="1" rowspan="1" style="" align="center" valign="top"/><td colspan="1" rowspan="1" style="" align="center" valign="top"><p>0.806</p></td><td colspan="1" rowspan="1" style="" align="center" valign="top"><p>0.926</p></td><td colspan="1" rowspan="1" style="" align="center" valign="top"><p>0.88</p></td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top"><p>PT</p></th><td colspan="1" rowspan="1" style="" align="center" valign="top"><p>0.866</p></td><td colspan="1" rowspan="1" style="" align="center" valign="top"><p>1</p></td><td colspan="1" rowspan="1" style="" align="center" valign="top"><p>0.768</p></td><td colspan="1" rowspan="1" style="" align="center" valign="top"><p>0.930</p></td><td colspan="1" rowspan="1" style="" align="center" valign="top"><p>0.899</p></td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top"><p>SR of AVE</p></th><td colspan="1" rowspan="1" style="" align="center" valign="top"><p>0.898</p></td><td colspan="1" rowspan="1" style="" align="center" valign="top"><p>0.876</p></td><td colspan="1" rowspan="1" style="" align="center" valign="top"/><td colspan="1" rowspan="1" style="" align="center" valign="top"/><td colspan="1" rowspan="1" style="" align="center" valign="top"/></tr></tbody></table><table-wrap-foot><p>Source: Primary Data Processed, 2024</p></table-wrap-foot></table-wrap><p>Additionally, the Average Variance Extracted (AVE) values calculated for each dimensional construct and the Task Specific Knowledge variable also exceeded the threshold of 0.50, indicating that convergent validity on the Task Specific Knowledge variable and its manifestations had been fulfilled. In the <xref ref-type="bibr" rid="BIBR-47">[47]</xref> criteria test, it was revealed that each correlation between latent variables produced values lower than the square root of the Average Variance Extracted (AVE) of each related construct. Therefore, it was concluded that the Task Specific Knowledge latent variable met the criteria for discriminant validity.</p><table-wrap id="table-9" ignoredToc=""><label>Table 9</label><caption><p>Cross Loading</p></caption><table frame="box" rules="all"><thead><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">Indicator</th><th colspan="1" rowspan="1" style="" align="center" valign="top">Technical Knowledge</th><th colspan="1" rowspan="1" style="" align="center" valign="top">Auditor Capacity</th><th colspan="1" rowspan="1" style="" align="center" valign="top">Keterangan</th></tr></thead><tbody><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">TSK_1</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.871</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.764</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Valid</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">TSK_3</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.906</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.831</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Valid</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">TSK_4</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.834</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.663</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Valid</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">TSK_6</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.893</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.767</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Valid</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">TSK_8</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.806</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.895</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Valid</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">TSK_9</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.749</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.899</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Valid</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">TSK_14</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.776</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.901</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Valid</td></tr></tbody></table><table-wrap-foot><p>Source: Primary Data Processed, 2024</p></table-wrap-foot></table-wrap><p>In the subsequent test, comparing the outer loading and cross-loading values, it was found that each outer loading value of the indicators on the respective constructs consistently exceeded all cross-loading values from other constructs. This indicated that discriminant validity on the Task Specific Knowledge variable had been met. In the final test regarding internal consistency reliability, the data showed that the Cronbach’s Alpha values for each dimensional construct revealed numbers above 0.70, while the Composite Reliability values for each dimensional construct also exceeded 0.708. Therefore, it can be concluded that the Task Specific Knowledge variable and its manifestations showed an adequate level of reliability. By evaluating the outer model measurement on the Task Specific Knowledge latent variable, which had been revised once, it can be concluded that all dimensional constructs and Task Specific Knowledge variables in the first revision showed a level of validity and reliability that met the rule of thumb criteria.</p><fig id="figure-6" ignoredToc=""><label>Figure 6</label><caption><p>The Initial Measurement Model</p></caption><p>Source: Primary Data Processed, 2024</p><graphic xlink:href="https://journals2.ums.ac.id/reaksi/article/download/6424/3608/43309" mimetype="image" mime-subtype="png"><alt-text>Image</alt-text></graphic></fig><p>Based on the outer model analysis above, it is concluded that some manifest variables have outer loading values below 0.708 (indicated in gray) on the Big Data variable, indicating the invalidity of some dimensions. This indicates the need for revision of the Big Data variable measurement model. Indicators BD_3, BD_7, and BD_13 are the cause of the invalidity of the Big Data variable. In the first revision stage, there was a redundancy issue where there was a significant correlation between indicator BD_15 (value) and BD_14 (veracity), with a correlation value of 0.811. This finding indicates redundancy between these indicators measuring different dimensions. The step taken to address this issue is to remove indicators that have high correlations with other indicators measuring different dimensions. After the revision, a second revision was performed, resulting in a total of three tests. The second revision model is considered the final model because convergent validity, discriminant validity, and internal consistency reliability have been met. Here are the details of the final model:</p><fig id="figure-7" ignoredToc=""><label>Figure 7</label><caption><p>The Final Measurement Model</p></caption><p>Source: Primary Data Processed, 2024</p><graphic xlink:href="https://journals2.ums.ac.id/reaksi/article/download/6424/3608/43310" mimetype="image" mime-subtype="png"><alt-text>Image</alt-text></graphic></fig><p>The results of the revision on the measurement instrument of the Big Data variable yielded parameter estimates that met the rule of thumb standards for validity and reliability. All outer loading values on the manifest variables to the dimensional constructs, as well as the outer loading values of the dimensional constructs to the Big Data variable, exceeded the threshold of 0.708.</p><table-wrap id="table-10" ignoredToc=""><label>Table 10</label><caption><p>Correlation Values Among Construct Dimensions, AVE, CR, and CA</p></caption><table frame="box" rules="all"><thead><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">Construct</th><th colspan="1" rowspan="1" style="" align="center" valign="top">Value</th><th colspan="1" rowspan="1" style="" align="center" valign="top">Variety</th><th colspan="1" rowspan="1" style="" align="center" valign="top">Velocity</th><th colspan="1" rowspan="1" style="" align="center" valign="top">Veracity</th><th colspan="1" rowspan="1" style="" align="center" valign="top">Volume</th><th colspan="1" rowspan="1" style="" align="center" valign="top">AVE</th><th colspan="1" rowspan="1" style="" align="center" valign="top">Composite Reliability</th><th colspan="1" rowspan="1" style="" align="center" valign="top">Cronbach's Alpha</th></tr></thead><tbody><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">Value</th><td colspan="1" rowspan="1" style="" align="center" valign="top">1</td><td colspan="1" rowspan="1" style="" align="center" valign="top"/><td colspan="1" rowspan="1" style="" align="center" valign="top"/><td colspan="1" rowspan="1" style="" align="center" valign="top"/><td colspan="1" rowspan="1" style="" align="center" valign="top"/><td colspan="1" rowspan="1" style="" align="center" valign="top">0.653</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.849</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.753</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">Variety</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.587</td><td colspan="1" rowspan="1" style="" align="center" valign="top">1</td><td colspan="1" rowspan="1" style="" align="center" valign="top"/><td colspan="1" rowspan="1" style="" align="center" valign="top"/><td colspan="1" rowspan="1" style="" align="center" valign="top"/><td colspan="1" rowspan="1" style="" align="center" valign="top">0.709</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.879</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.792</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">Velocity</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.647</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.776</td><td colspan="1" rowspan="1" style="" align="center" valign="top">1</td><td colspan="1" rowspan="1" style="" align="center" valign="top"/><td colspan="1" rowspan="1" style="" align="center" valign="top"/><td colspan="1" rowspan="1" style="" align="center" valign="top">0.877</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.955</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.93</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">Veracity</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.682</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.733</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.841</td><td colspan="1" rowspan="1" style="" align="center" valign="top">1</td><td colspan="1" rowspan="1" style="" align="center" valign="top"/><td colspan="1" rowspan="1" style="" align="center" valign="top">0.825</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.934</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.893</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">Volume</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.537</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.684</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.644</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.624</td><td colspan="1" rowspan="1" style="" align="center" valign="top">1</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.875</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.933</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.857</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">SR of AVE</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.808</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.842</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.936</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.908</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.935</td><td colspan="1" rowspan="1" style="" align="center" valign="top"/><td colspan="1" rowspan="1" style="" align="center" valign="top"/><td colspan="1" rowspan="1" style="" align="center" valign="top"/></tr></tbody></table><table-wrap-foot><p>Source: Primary Data Processed, 2024</p></table-wrap-foot></table-wrap><p>Additionally, the Average Variance Extracted (AVE) values calculated for each dimensional construct and the Big Data variable also exceeded the threshold of 0.50, indicating that convergent validity on the Big Data variable and its manifestations has been met. Furthermore, in the <xref ref-type="bibr" rid="BIBR-47">[47]</xref> criteria test, it was revealed that each correlation between latent variables produced a value lower than the square root of the Average Variance Extracted (AVE) of the respective related constructs. Therefore, it can be concluded that the Big Data latent variable meets the criteria for discriminant validity.</p><table-wrap id="table-11" ignoredToc=""><label>Table 11</label><caption><p>Cross Loading</p></caption><table frame="box" rules="all"><thead><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">Indicator</th><th colspan="1" rowspan="1" style="" align="center" valign="top">Volume</th><th colspan="1" rowspan="1" style="" align="center" valign="top">Variety</th><th colspan="1" rowspan="1" style="" align="center" valign="top">Variety</th><th colspan="1" rowspan="1" style="" align="center" valign="top">Veracity</th><th colspan="1" rowspan="1" style="" align="center" valign="top">Value</th><th colspan="1" rowspan="1" style="" align="center" valign="top">Description</th></tr></thead><tbody><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">BD_1</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.933</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.609</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.570</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.569</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.534</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Valid</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">BD_2</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.938</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.670</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.634</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.598</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.473</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Valid</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">BD_4</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.635</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.890</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.676</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.652</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.539</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Valid</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">BD_5</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.584</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.871</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.675</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.676</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.501</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Valid</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">BD_6</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.502</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.759</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.607</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.512</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.438</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Valid</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">BD_8</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.669</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.780</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.941</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.767</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.603</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Valid</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">BD_9</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.556</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.706</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.930</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.811</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.594</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Valid</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">BD_10</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.583</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.692</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.939</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.786</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.620</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Valid</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">BD_11</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.587</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.718</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.824</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.948</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.633</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Valid</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">BD_12</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.596</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.671</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.779</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.932</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.650</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Valid</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">BD_14</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.513</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.603</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.682</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.842</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.573</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Valid</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">BD_16</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.342</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.305</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.370</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.423</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.834</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Valid</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">BD_17</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.354</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.304</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.336</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.372</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.800</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Valid</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">BD_18</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.536</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.677</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.724</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.732</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.789</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Valid</td></tr></tbody></table></table-wrap><p>The next test involved comparing the outer loading values and cross loading values, which found that each indicator's outer loading value on the respective construct consistently exceeded all cross loading values from other constructs. This indicates that discriminant validity on the Big Data variable has been met. The final test was internal consistency reliability. Referring to the data listed in the <xref ref-type="fig" rid="figure-4">Figure 4</xref>, it can be observed that the Cronbach's Alpha values for each dimensional construct reveal figures above 0.70, while the Composite Reliability values for each dimensional construct also show figures exceeding 0.708. Therefore, it can be acknowledged that the Big Data variable along with its manifestations demonstrate an adequate level of reliability. By evaluating the outer model measurement of the Big Data latent variable, which has been revised twice, it can be concluded that all dimensional constructs and the Big Data variable in the third revision exhibit levels of validity and reliability that meet the rule of thumb criteria.</p><fig id="figure-8" ignoredToc=""><label>Figure 8</label><caption><p>The Initial Measurement Model</p></caption><p>Source: Primary Data Processed, 2024</p><graphic xlink:href="https://journals2.ums.ac.id/reaksi/article/download/6424/3608/43311" mimetype="image" mime-subtype="png"><alt-text>Image</alt-text></graphic></fig><p>Based on the outer model above, it can be observed that all outer loading values of those indicators exceed the threshold of 0.708. Additionally, the Average Variance Extracted (AVE) values also surpass 0.50, indicating that all indicators meet the validity criteria. All outer loading values on the manifest variables to the dimensional constructs, as well as the outer loading values from the dimensional constructs to the Fraud Detection variable, all exceed 0.708. The AVE calculated for each dimensional construct and the Fraud Detection variable also exceed the threshold of 0.50, indicating convergent validity on the Fraud Detection variable and its manifestations.</p><table-wrap id="table-12" ignoredToc=""><label>Table 12</label><caption><p>Correlation Values Among Construct Dimensions</p></caption><table frame="box" rules="all"><thead><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">Construct</th><th colspan="1" rowspan="1" style="" align="center" valign="top">Kak</th><th colspan="1" rowspan="1" style="" align="center" valign="top">KeCTan</th><th colspan="1" rowspan="1" style="" align="center" valign="top">KDK</th><th colspan="1" rowspan="1" style="" align="center" valign="top">SKT</th></tr></thead><tbody><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">Kak</th><td colspan="1" rowspan="1" style="" align="center" valign="top">1</td><td colspan="1" rowspan="1" style="" align="center" valign="top"/><td colspan="1" rowspan="1" style="" align="center" valign="top"/><td colspan="1" rowspan="1" style="" align="center" valign="top"/></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">KeCTan</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.904</td><td colspan="1" rowspan="1" style="" align="center" valign="top">1</td><td colspan="1" rowspan="1" style="" align="center" valign="top"/><td colspan="1" rowspan="1" style="" align="center" valign="top"/></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">KDK</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.935</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.937</td><td colspan="1" rowspan="1" style="" align="center" valign="top">1</td><td colspan="1" rowspan="1" style="" align="center" valign="top"/></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">SKT</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.941</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.925</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.949</td><td colspan="1" rowspan="1" style="" align="center" valign="top">1</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">SR of AVE</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.950</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.949</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.935</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.947</td></tr></tbody></table><table-wrap-foot><p>Source: Primary Data Processed, 2024</p></table-wrap-foot></table-wrap><p>Furthermore, in the <xref ref-type="bibr" rid="BIBR-47">[47]</xref> criteria test, there was redundancy issue where the correlation values between indicators showed that the square root of the AVE of the KDK construct was smaller than the correlation values between latent constructs (SKT) which were significant, namely 0.935 &lt; 0.949. Likewise, the square root of the AVE of the KDK construct was smaller than the correlation values between latent constructs (KeCTan) which were significant, namely 0.935 &lt; 0.937. And the square root of the AVE of the KDK construct was equal to the correlation values between latent constructs (Kak), which is 0.935. This indicates that the Fraud Detection latent variable does not meet the criteria for discriminant validity. Therefore, the step taken to address this issue is to remove indicators that have high correlations with other indicators measuring different dimensions. After that, a revision was made, so there was a total of 1 revision to the model, resulting in 2 testing phases. The first revised model is considered as the final model because convergent validity, discriminant validity, and internal consistency reliability have been fulfilled. Below is the detail of the final model:</p><fig id="figure-9" ignoredToc=""><label>Figure 9</label><caption><p>The Final Measurement Model</p></caption><graphic xlink:href="https://journals2.ums.ac.id/reaksi/article/download/6424/3608/43312" mimetype="image" mime-subtype="png"><alt-text>Image</alt-text></graphic></fig><p>The results of the revision on the measurement instrument of Fraud Detection variable yielded parameter estimations that meet the levels of validity and reliability according to the rule of thumb standard. All outer loading values on the manifest variables to the dimensional constructs, and the outer loading values of the dimensional constructs to the Fraud Detection variable, exceed the threshold of 0.708.</p><table-wrap id="table-13" ignoredToc=""><label>Table 13</label><caption><p>Correlation Values Among Construct Dimensions, AVE, CR, and CA</p></caption><table frame="box" rules="all"><thead><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">Indicator</th><th colspan="1" rowspan="1" style="" align="center" valign="top">Kak</th><th colspan="1" rowspan="1" style="" align="center" valign="top">KeCTan</th><th colspan="1" rowspan="1" style="" align="center" valign="top">KDK</th><th colspan="1" rowspan="1" style="" align="center" valign="top">SKT</th><th colspan="1" rowspan="1" style="" align="center" valign="top">AVE</th><th colspan="1" rowspan="1" style="" align="center" valign="top">Composite Reliability</th><th colspan="1" rowspan="1" style="" align="center" valign="top">Cronbach's Alpha</th></tr></thead><tbody><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">Kak</th><td colspan="1" rowspan="1" style="" align="center" valign="top">1</td><td colspan="1" rowspan="1" style="" align="center" valign="top"/><td colspan="1" rowspan="1" style="" align="center" valign="top"/><td colspan="1" rowspan="1" style="" align="center" valign="top"/><td colspan="1" rowspan="1" style="" align="center" valign="top">0.903</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.949</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.893</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">KeCTan</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.904</td><td colspan="1" rowspan="1" style="" align="center" valign="top">1</td><td colspan="1" rowspan="1" style="" align="center" valign="top"/><td colspan="1" rowspan="1" style="" align="center" valign="top"/><td colspan="1" rowspan="1" style="" align="center" valign="top">0.9</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.947</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.889</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">KDK</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.924</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.929</td><td colspan="1" rowspan="1" style="" align="center" valign="top">1</td><td colspan="1" rowspan="1" style="" align="center" valign="top"/><td colspan="1" rowspan="1" style="" align="center" valign="top">0.892</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.961</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.939</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">SKT</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.941</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.925</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.925</td><td colspan="1" rowspan="1" style="" align="center" valign="top">1</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.896</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.963</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.942</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">SR of AVE</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.95</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.949</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.944</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.947</td><td colspan="1" rowspan="1" style="" align="center" valign="top"/><td colspan="1" rowspan="1" style="" align="center" valign="top"/><td colspan="1" rowspan="1" style="" align="center" valign="top"/></tr></tbody></table><table-wrap-foot><p>Source: Primary Data Processed, 2024</p></table-wrap-foot></table-wrap><p>Additionally, the Average Variance Extracted (AVE) values calculated for each dimensional construct and the Fraud Detection variable also exceed the threshold of 0.50, indicating that convergent validity on the Fraud Detection variable and its manifestations has been fulfilled. In the Fornell &amp; Larcker (1981) criteria test, it was revealed that each correlation between latent variables yields a value lower than the square root of the Average Variance Extracted (AVE) of each related construct. Therefore, it is concluded that the Fraud Detection latent variable meets the criteria for discriminant validity.</p><table-wrap id="table-14" ignoredToc=""><label>Table 14</label><caption><p>Cross Loading</p></caption><table frame="box" rules="all"><thead><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">Indicator</th><th colspan="1" rowspan="1" style="" align="center" valign="top">KDK</th><th colspan="1" rowspan="1" style="" align="center" valign="top">SKT</th><th colspan="1" rowspan="1" style="" align="center" valign="top">KAk</th><th colspan="1" rowspan="1" style="" align="center" valign="top">KeCTan</th><th colspan="1" rowspan="1" style="" align="center" valign="top">Description</th></tr></thead><tbody><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">PF_2</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.929</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.868</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.827</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.880</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Valid</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">PF_3</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.956</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.889</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.918</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.881</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Valid</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">PF_4</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.948</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.865</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.872</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.872</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Valid</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">PF_5</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.854</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.938</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.878</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.863</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Valid</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">PF_6</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.887</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.956</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.877</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.877</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Valid</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">PF_7</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.886</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.946</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.918</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.887</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Valid</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">PF_8</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.830</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.887</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.947</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.818</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Valid</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">PF_9</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.924</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.902</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.953</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.899</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Valid</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">PF_10</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.838</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.846</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.796</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.944</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Valid</td></tr><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">PF_11</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.922</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.907</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.915</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.953</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Valid</td></tr></tbody></table><table-wrap-foot><p>Source: Primary Data Processed, 2024</p></table-wrap-foot></table-wrap><p>The subsequent test involves comparing the outer loading values and cross-loading values, where it was found that each outer loading value of the indicators on the respective constructs consistently exceeds all cross-loading values from other constructs. This indicates that discriminant validity on the Fraud Detection variable has been fulfilled. The final test is internal consistency reliability. Referring to the data listed in the table, it can be observed that the Cronbach’s Alpha values for each dimensional construct are above 0.70, while the Composite Reliability values for each dimensional construct also exceed 0.708. Therefore, it can be acknowledged that the Fraud Detection variable along with its manifestations demonstrate adequate levels of reliability. By evaluating the outer model measurement of the Fraud Detection latent variable, which has been revised once, it can be concluded that all dimensional constructs and the Fraud Detection variable in the first revision demonstrate levels of validity and reliability that meet the rule of thumb criteria.</p></sec><sec><title>INNER MODEL</title><sec><title>R Square</title><p>The coefficient of determination (R Square Adjusted) test was conducted using Smart PLS 4, resulting in the following data:</p><table-wrap id="table-15" ignoredToc=""><label>Table 15</label><caption><p>R Square</p></caption><table frame="box" rules="all"><thead><tr><th colspan="1" rowspan="1" style="" align="center" valign="top"/><th colspan="1" rowspan="1" style="" align="center" valign="top">R Square</th><th colspan="1" rowspan="1" style="" align="center" valign="top">R Square Adjusted</th></tr></thead><tbody><tr><td colspan="1" rowspan="1" style="" align="center" valign="top">Fraud Detection</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.975</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.974</td></tr></tbody></table><table-wrap-foot><p>Source: Primary Data Processed, 2024</p></table-wrap-foot></table-wrap><p>From the table above, it can be seen that the Adjusted R Square value reaches 0.974. This result indicates that 97.4% of the variance in the Fraud Detection variable can be explained by the variance in the Auditor Religiosity (X1), Computer Assisted Audit Techniques (X2), Task Specific Knowledge (X3), and Big Data (X4) variables. Conversely, the remaining 2.6% is influenced by other factors outside the scope of this study. This interpretation implies that the higher the contribution of these three exogenous variables to the endogenous variable, the stronger the relationship in the structural equation. Referring to the rule of thumb criteria adopted from <xref ref-type="bibr" rid="BIBR-51">[51]</xref> and <xref ref-type="bibr" rid="BIBR-49">[49]</xref>, it can be concluded that this model is categorized as a strong model, with a value of 0.926 exceeding the threshold of 0.67 and 0.75, as recommended by these criteria.</p></sec><sec><title>Effect Size F2</title><p>Hair et al., (2022: 209) explained that the effect size F2 facilitates the assessment of the contribution of an exogenous construct to the R2 value of the predictor latent variable. Values of F2 at 0.02, 0.15, and 0.35 indicate small, medium, or large effects, respectively, of a predictor construct on an endogenous construct. The F2 test was conducted using Smart PLS 4 with the following results:</p><table-wrap id="table-16" ignoredToc=""><label>Table 16</label><caption><p>Effect Size F2</p></caption><table frame="box" rules="all"><thead><tr><th colspan="1" rowspan="1" style="" align="left" valign="top"/><th colspan="1" rowspan="1" style="" align="left" valign="top">Fraud Detection</th></tr></thead><tbody><tr><th colspan="1" rowspan="1" style="" align="left" valign="top">Auditor Religiosity</th><td colspan="1" rowspan="1" style="" align="center" valign="top">14.917</td></tr><tr><th colspan="1" rowspan="1" style="" align="left" valign="top">Computer Assisted Audit Techniques</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.000</td></tr><tr><th colspan="1" rowspan="1" style="" align="left" valign="top">Task Specific Knowledge</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.016</td></tr><tr><th colspan="1" rowspan="1" style="" align="left" valign="top">Big Data</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.000</td></tr><tr><th colspan="1" rowspan="1" style="" align="left" valign="top">AR_BD</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.004</td></tr><tr><th colspan="1" rowspan="1" style="" align="left" valign="top">CAATs_BD</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.019</td></tr><tr><th colspan="1" rowspan="1" style="" align="left" valign="top">TSK_BD</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.000</td></tr></tbody></table><table-wrap-foot><p>Source: Primary Data Processed, 2024</p></table-wrap-foot></table-wrap><p>Based on the test results, the effect size f2 values are as follows: Auditor Religiosity (14.917, &gt;0.35), Computer Assisted Audit Techniques (0.000, &lt;0.02), and Task Specific Knowledge (0.016, &gt;0.35). This indicates that X1 has a large effect size f2, while X2 and X3 do not have significant effect sizes f2. Additionally, the effect size f2 for the Big Data variable is 0.000 (&lt;0.02), indicating that X4 does not have a significant effect size f2. Furthermore, the effect size f2 for the moderating effects are as follows: RA_BD is 0.004 (&lt;0.005) for M1, CAATs_BD is 0.019 (&gt;0.01) for M2, and TSK_BD is 0.000 (&lt;0.005) for M3. This shows that M1 and M3 do not have significant effect sizes f2, while M2 has a medium effect size f2.</p></sec><sec><title>Q2 Predictive Relevance</title><table-wrap id="table-17" ignoredToc=""><label>Table 17</label><caption><p>Q2 Predictive Relevance</p></caption><table frame="box" rules="all"><thead><tr><th colspan="1" rowspan="1" style="" align="center" valign="top"/><th colspan="1" rowspan="1" style="" align="center" valign="top">RMSE</th><th colspan="1" rowspan="1" style="" align="center" valign="top">MAE</th><th colspan="1" rowspan="1" style="" align="center" valign="top">Q²_predict</th></tr></thead><tbody><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">Fraud Detection</th><td colspan="1" rowspan="1" style="" align="center" valign="top">0.165</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.095</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.974</td></tr></tbody></table><table-wrap-foot><p>Source: Primary Data Processed, 2024</p></table-wrap-foot></table-wrap><p>Based on the table above, it can be seen that the value of Q2 prediction reaches 0.974. This result indicates that the model has strong predictive relevance. A Q2 prediction value approaching 1 indicates that the model has high predictive ability.</p></sec><sec><title>Significance Test</title><table-wrap id="table-18" ignoredToc=""><label>Table 18</label><caption><p>Path Coefficient, t-statistics significance, dan p-value</p></caption><table frame="box" rules="all"><thead><tr><th colspan="1" rowspan="1" style="" align="center" valign="top">Konstrulk</th><th colspan="1" rowspan="1" style="" align="center" valign="top">Original Sample (O)</th><th colspan="1" rowspan="1" style="" align="center" valign="top">T Statistics</th><th colspan="1" rowspan="1" style="" align="center" valign="top">P Values</th><th colspan="1" rowspan="1" style="" align="center" valign="top">Result</th></tr></thead><tbody><tr><td colspan="1" rowspan="1" style="" align="center" valign="top">RA -&gt; PF</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.957</td><td colspan="1" rowspan="1" style="" align="center" valign="top">66.126</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.000</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Ha1.a diterima</td></tr><tr><td colspan="1" rowspan="1" style="" align="center" valign="top">CAATs -&gt; PF</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.003</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.160</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.436</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Ha1.b ditolak</td></tr><tr><td colspan="1" rowspan="1" style="" align="center" valign="top">TSK -&gt; PF</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.035</td><td colspan="1" rowspan="1" style="" align="center" valign="top">1.793</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.036</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Ha1.c diterima</td></tr><tr><td colspan="1" rowspan="1" style="" align="center" valign="top">BD -&gt; PF</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.001</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.094</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.462</td><td colspan="1" rowspan="1" style="" align="center" valign="top">-</td></tr><tr><td colspan="1" rowspan="1" style="" align="center" valign="top">RA_BD -&gt; PF</td><td colspan="1" rowspan="1" style="" align="center" valign="top">-0.016</td><td colspan="1" rowspan="1" style="" align="center" valign="top">1.055</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.146</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Ha2.a ditolak</td></tr><tr><td colspan="1" rowspan="1" style="" align="center" valign="top">CAATs_BD -&gt; PF</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.022</td><td colspan="1" rowspan="1" style="" align="center" valign="top">2.362</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.009</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Ha2.b diterima</td></tr><tr><td colspan="1" rowspan="1" style="" align="center" valign="top">TSK_BD -&gt; PF</td><td colspan="1" rowspan="1" style="" align="center" valign="top">-0.001</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.088</td><td colspan="1" rowspan="1" style="" align="center" valign="top">0.465</td><td colspan="1" rowspan="1" style="" align="center" valign="top">Ha2.c ditolak</td></tr></tbody></table><table-wrap-foot><p>Source: Primary Data Processed, 2024</p></table-wrap-foot></table-wrap><list list-type="order"><list-item><p>Based on the original sample value of 0.957 (95.7%), there is a positive and significant influence of Auditor Religiosity on Fraud Detection, as evidenced by the t-statistic value of 66.126, which is greater than the t-table value of 1.6518. Additionally, the obtained p-value of 0.000 indicates statistical significance (&lt; 0.05). Therefore, based on the research hypothesis, H01.a is rejected and Ha1.a is accepted, indicating that Auditor Religiosity has a significant influence on Fraud Detection.</p></list-item><list-item><p>Based on the original sample value of 0.003 (0.3%), there is a positive but not significant influence of Computer Assisted Audit Techniques on Fraud Detection, as evidenced by the t-statistic value of 0.160, which is less than the t-table value of 1.6518. Additionally, the obtained p-value of 0.436 indicates no statistical significance (&gt; 0.05). Therefore, based on the research hypothesis, H01.b is accepted and Ha1.b is rejected, indicating that Computer Assisted Audit Techniques do not have a significant influence on Fraud Detection.</p></list-item><list-item><p>Based on the original sample value of 0.035 (3.5%), there is a positive and significant influence of Task Specific Knowledge on Fraud Detection, as evidenced by the t-statistic value of 1.793, which is greater than the t-table value of 1.6518. Additionally, the obtained p-value of 0.036 indicates statistical significance (&lt; 0.05). Therefore, based on the research hypothesis, H01.c is rejected and Ha1.c is accepted, indicating that Task Specific Knowledge has a significant influence on Fraud Detection.</p></list-item><list-item><p>Based on the original sample value of -0.016 (-1.6%), there is a negative influence of Big Data on the impact of Auditor Religiosity on Fraud Detection. However, this influence is not significant, as evidenced by the t-statistic value of 1.055, which is less than the t-table value of 1.6518. Additionally, the obtained p-value of 0.146 indicates no statistical significance (&gt; 0.05). Therefore, based on the research hypothesis, H02.a is accepted and Ha2.a is rejected, indicating that Big Data does not moderate the influence of Auditor Religiosity on Fraud Detection.</p></list-item><list-item><p>Based on the original sample value of 0.022 (2.2%), there is a positive and significant influence of Big Data on the impact of Computer Assisted Audit Techniques on Fraud Detection, as evidenced by the t-statistic value of 2.362, which is greater than the t-table value of 1.6518. Additionally, the obtained p-value of 0.009 indicates statistical significance (&lt; 0.05). Therefore, based on the research hypothesis, H02.b is rejected and Ha2.b is accepted, indicating that Big Data moderates the influence of Computer Assisted Audit Techniques on Fraud Detection.</p></list-item><list-item><p>Based on the original sample value of -0.001 (-0.1%), there is a negative influence of Auditor Religiosity on the impact of Task Specific Knowledge on Fraud Detection. However, this influence is not significant, as evidenced by the t-statistic value of 0.088, which is less than the t-table value of 1.6518. Additionally, the obtained p-value of 0.465 indicates no statistical significance (&gt; 0.05). Therefore, based on the research hypothesis, H02.c is accepted and Ha2.c is rejected, indicating that Big Data does not moderate the influence of Task Specific Knowledge on Fraud Detection.</p></list-item></list></sec></sec></sec><sec><title>DISCUSSION</title><p>H1a: Auditor Religiosity has a significant influence on Fraud Detection</p><p>Based on the data analysis, it is confirmed that Auditor Religiosity has a significant influence on Fraud Detection. Attribution theory, proposed by <xref ref-type="bibr" rid="BIBR-33">[33]</xref>, is used as the framework to explain the research findings. This theory considers how individuals explain behavior and events, either through dispositional attributions (related to the individual) or situational attributions (related to the context). In this context, auditors with higher religiosity tend to have more positive dispositional attributions towards ethical behavior and are more likely to perceive unethical behavior as wrong, thereby increasing their likelihood of detecting fraud. In synthesis, attribution theory suggests that auditor religiosity influences the dispositional and situational attributions used by auditors in understanding behaviors and events associated with accounting fraud. Higher auditor religiosity can enhance more positive dispositional attributions and more accurate situational attributions, thereby improving auditors' ability to detect accounting fraud. Religious auditors may be more sensitive to indications of fraud because they are more inclined to believe that ethical behavior should always be maintained, regardless of whether the situation is supportive or not. Therefore, religiosity not only affects auditors' intrinsic motivation but also their assessment and reaction to potentially fraudulent situations. These findings are consistent with the research conducted by <xref ref-type="bibr" rid="BIBR-9">[9]</xref> and <xref ref-type="bibr" rid="BIBR-10">[10]</xref>, which demonstrated the influence of religiosity on fraud detection by auditors. This research aligns with the study by <xref ref-type="bibr" rid="BIBR-11">[11]</xref>, which showed that religiosity significantly impacts auditors' ability to detect fraud.</p><p>H1b: CAATs has a significant influence on Fraud Detection</p><p>Based on the data analysis, it is confirmed that CAATs (Computer Assisted Audit Techniques) do not have a significant influence on Fraud Detection. This is due to the fact that, although auditors have a positive perception of using Excel as an audit tool, the capabilities and complexity of Excel may not be sufficient to detect more sophisticated fraud. The Unified Theory of Acceptance and Use of Technology (UTAUT) is used as the framework to explain the relationship between the use of CAATs and fraud detection. UTAUT considers four main constructs: performance expectancy, effort expectancy, social influence, and facilitating conditions. In this context, although auditors have positive perceptions (high performance and effort expectancy), feel supported by colleagues (social influence), and have access to the necessary resources (facilitating conditions), the use of Excel remains inadequate for detecting more sophisticated fraud. This is due to Excel's limitations in analyzing highly complex data or detecting subtler fraud patterns, which often require more specialized and advanced audit tools. Furthermore, UTAUT helps explain that, although auditors perceive benefits and ease of use with Excel, and there is social support and adequate conditions, these factors do not automatically translate into increased effectiveness in fraud detection. This indicates that, beyond technology adoption, the quality and suitability of the audit tool for specific tasks such as fraud detection are also crucial. These findings are consistent with the research conducted by <xref ref-type="bibr" rid="BIBR-19">[19]</xref> and <xref ref-type="bibr" rid="BIBR-18">[18]</xref>. However, studies by <xref ref-type="bibr" rid="BIBR-13">[13]</xref>, <xref ref-type="bibr" rid="BIBR-14">[14]</xref>, <xref ref-type="bibr" rid="BIBR-15">[15]</xref>, dan <xref ref-type="bibr" rid="BIBR-16">[16]</xref>, which show that CAATs do not have a significant impact on Fraud Detection, present different results. The study by Widuri &amp; <xref ref-type="bibr" rid="BIBR-17">[17]</xref>, using a qualitative approach, also contrasts with this, indicating that the implementation of CAATs plays a crucial role in Fraud Detection.</p><p>H1c: Task Specific Knowledge has a significant influence on Fraud Detection</p><p>Based on the data analysis, it is confirmed that Task Specific Knowledge has a significant influence on Fraud Detection. This is attributed to two main factors: first, auditors with specialized knowledge in audit tasks tend to be more competent in identifying and analyzing signs of fraud. Second, in-depth knowledge of audit procedures and fraud detection techniques allows auditors to more accurately evaluate and interpret suspicious data. In the context of cognitive dissonance theory proposed by <xref ref-type="bibr" rid="BIBR-32">[32]</xref>, to reduce this dissonance, individuals tend to seek consistency through changes in their attitudes, beliefs, or behaviors. Auditors with specific knowledge of audit tasks have a strong knowledge base to detect fraud. When faced with information or data that is inconsistent with their understanding of how financial processes should occur, they experience cognitive dissonance. To reduce this dissonance, auditors are more likely to delve deeper and conduct more thorough examinations to identify the source of these inconsistencies, ultimately enhancing their ability to detect fraud. These findings support previous research by <xref ref-type="bibr" rid="BIBR-20">[20]</xref>, Betri &amp; Kusumawaty (2019), <xref ref-type="bibr" rid="BIBR-22">[22]</xref>, which showed that Task Specific Knowledge influences Fraud Detection by auditors. This research is supported by studies by <xref ref-type="bibr" rid="BIBR-23">[23]</xref>, <xref ref-type="bibr" rid="BIBR-24">[24]</xref>, <xref ref-type="bibr" rid="BIBR-3">[3]</xref>, dan <xref ref-type="bibr" rid="BIBR-26">[26]</xref>, and is consistent with cognitive dissonance theory.</p><p>H2a: Big Data Moderates the Influence of Auditor Religiosity on Fraud Detection</p><p>Based on the analysis results, it is confirmed that Big Data does not moderate the influence of Auditor Religiosity on Fraud Detection. This is attributed to two main factors: first, although Big Data offers significant potential to enhance data analysis capabilities, its effective use in fraud detection requires specialized tools, skills, and deep understanding that are not possessed by all auditors. Second, religiosity factors are more intrinsic and related to the personal values of auditors, which may not be directly influenced by sophisticated data analysis tools like Big Data. Attribution theory by <xref ref-type="bibr" rid="BIBR-33">[33]</xref> and UTAUT by <xref ref-type="bibr" rid="BIBR-31">[31]</xref> can help explain why Big Data does not moderate the influence of auditor religiosity on fraud detection. Religiosity is a dispositional factor that influences the personal values and ethics of auditors, while Big Data is a technical tool. Although Big Data can enhance data analysis capabilities, the religious values of auditors tend to influence how they perceive and react to fraud situations more than just the tools they use. Therefore, while Big Data can assist in fraud detection, the influence of auditor religiosity on fraud detection is more intrinsic and not significantly moderated by the use of Big Data.</p><p>H2b: Auditor Religiosity Moderates the Influence of CAATs on Fraud Detection</p><p>Based on the analysis results, it is confirmed that Big Data moderates and strengthens the influence of Computer Assisted Audit Techniques (CAATs) on Fraud Detection. This is attributed to two main factors: first, Big Data provides volume, variety, velocity, veracity, and value of data, enabling CAATs to analyze data on a much larger and more complex scale. Second, the integration of Big Data with CAATs allows auditors to detect patterns and anomalies that may not be visible with traditional audit techniques or smaller datasets. UTAUT by Venkatesh et al., (2003) can explain the relationship between these variables. With the existence of Big Data, auditors can conduct data analysis on a larger scale and at a faster pace. This enables CAATs to identify more complex and hidden fraud patterns that may not be detected with smaller datasets. The integration of Big Data and CAATs also enables auditors to perform predictive analysis and identify potential risks before fraud occurs. This enhances auditors' ability to proactively detect and prevent fraud. Thus, Big Data not only enhances the effectiveness of CAATs but also transforms auditors' approach from reactive to proactive in fraud detection.</p><p>H2c: Auditor Religiosity Moderates the Influence of Task Specific Knowledge on Fraud Detection</p><p>Based on the analysis results, it is confirmed that Big Data does not moderate the influence of Task Specific Knowledge on Fraud Detection. This is attributed to two main factors: first, although Big Data offers significant potential in data analysis, its effectiveness in detecting fraud largely depends on auditors' ability to utilize the data effectively. Auditors with specific knowledge about audit tasks may not yet be fully skilled or experienced in using Big Data, thus the potential of this technology is not fully realized. Second, Task Specific Knowledge tends to focus more on technical skills and knowledge directly related to the audit process, which may not be fully enhanced solely by the presence of Big Data without adequate data analysis skills support. By utilizing UTAUT by <xref ref-type="bibr" rid="BIBR-31">[31]</xref> and cognitive dissonance theory by Festinger (1957) as the conceptual framework, we can understand that although auditors possess strong Task Specific Knowledge, the success of Big Data utilization in fraud detection largely depends on how comfortable and competent they feel in using the technology. Performance and effort expectations, social influence, as well as facilitating conditions all play crucial roles in determining the extent to which Big Data can influence fraud detection. Discomfort or lack of skills in using Big Data may hinder the potential of this technology, even though auditors have adequate technical knowledge.</p></sec><sec><title>Conclusion</title><p>Based on the data analysis, several key conclusions and practical recommendations regarding fraud detection in auditing emerge. The study confirms that Auditor Religiosity significantly influences Fraud Detection. Auditors with higher levels of religiosity are more likely to adhere to strong ethical standards, which enhances their ability to detect fraudulent activities. This finding emphasizes the importance of integrating auditors' personal values and beliefs into their professional conduct. Organizations should thus foster an environment that supports and respects auditors' ethical standards and personal values.</p><p>Conversely, Computer Assisted Audit Techniques (CAATs) do not have a significant influence on Fraud Detection in this study. Although CAATs are intended to improve audit efficiency and accuracy, their effectiveness in detecting fraud may be limited by factors such as data quality and auditors' proficiency with these tools. It is essential for organizations to ensure that auditors receive comprehensive training in CAATs and that these techniques are properly implemented to maximize their potential benefits.</p><p>Task-Specific Knowledge, however, does significantly impact Fraud Detection. Auditors with specialized knowledge in their audit tasks are better equipped to identify and analyze fraudulent activities. This underscores the necessity for ongoing professional development and targeted training programs to keep auditors updated on the latest fraud detection techniques and best practices.</p><p>The role of Big Data in this context is nuanced. The study finds that Big Data does not moderate the relationship between Auditor Religiosity and Fraud Detection or between Task-Specific Knowledge and Fraud Detection. However, Big Data does moderate the influence of CAATs on Fraud Detection. This suggests that while Big Data itself may not directly enhance fraud detection, its interaction with CAATs can be beneficial. Organizations should therefore focus on improving their capabilities to manage and analyze Big Data effectively, leveraging it to enhance the functionality of CAATs.</p><p>In conclusion, to enhance fraud detection capabilities, organizations should invest in comprehensive training and development programs to improve auditors' task-specific knowledge and ethical awareness. Additionally, adopting and effectively integrating CAATs into the audit process, along with creating an ethical work environment that aligns with auditors' personal values, can significantly boost fraud detection efforts. Addressing these recommendations will help organizations overcome challenges associated with Big Data and optimize the use of auditors' attributes and technological tools in their fraud detection practices.</p></sec></body><back><ref-list><title>References</title><ref id="BIBR-1"><element-citation publication-type="book"><article-title>Audit Internal</article-title><person-group person-group-type="author"><name><surname>Kumaat</surname><given-names>V.G.</given-names></name></person-group><year>2011</year><publisher-name>Penerbit Erlangga</publisher-name><publisher-loc>Jakarta</publisher-loc></element-citation></ref><ref id="BIBR-2"><element-citation publication-type="book"><article-title>Religion and Society in Social Tension</article-title><person-group person-group-type="author"><name><surname>Glock</surname><given-names>C.Y.</given-names></name><name><surname>Stark</surname><given-names>R.</given-names></name></person-group><year>1965</year><publisher-name>Rand McNally and Company</publisher-name><publisher-loc>USA</publisher-loc></element-citation></ref><ref id="BIBR-3"><element-citation publication-type="chapter"><article-title>Religiusitas pada Hijabers Community Bandung</article-title><source>Prosiding SNaPP2012: Sosial, Ekonomi, dan Humaniora</source><volume>3</volume><person-group person-group-type="author"><name><surname>Sari</surname><given-names>Y.</given-names></name><name><surname>S</surname><given-names>Rd A.Fajri</given-names></name><name><surname>Syuriansyah</surname><given-names>T.</given-names></name></person-group><year>2012</year><page-range>311-318,</page-range></element-citation></ref><ref id="BIBR-4"><element-citation publication-type="article-journal"><article-title>A selection model for auditing</article-title><source>Industrial Management &amp; Data</source><volume>111</volume><issue>5</issue><person-group person-group-type="author"><name><surname>Lin</surname><given-names>C.</given-names></name><name><surname>Wang</surname><given-names>C.</given-names></name></person-group><year>2011</year><page-range>776-790,</page-range></element-citation></ref><ref id="BIBR-5"><element-citation publication-type=""><article-title>Fraud Detection through Routine Use of CAATTs</article-title><person-group person-group-type="author"><name><surname>Lala</surname><given-names>S.</given-names></name><name><surname>Gupta</surname><given-names>M.</given-names></name><name><surname>Sharman</surname><given-names>R.</given-names></name></person-group><year>2014</year></element-citation></ref><ref id="BIBR-6"><element-citation publication-type="book"><article-title>The role of knowledge and memory in audit judgment</article-title><person-group person-group-type="author"><name><surname>Libby</surname><given-names>R.</given-names></name></person-group><year>1995</year><publisher-name>Cambridge University Press</publisher-name><publisher-loc>New York</publisher-loc></element-citation></ref><ref id="BIBR-7"><element-citation publication-type="article-journal"><article-title>Data-intensive applications, challenges, techniques and technologies: A survey on Big Data</article-title><source>Inf Sci</source><volume>N Y</volume><person-group person-group-type="author"><name><surname>Chen</surname><given-names>C.L.P.</given-names></name><name><surname>Zhang</surname><given-names>C.-Y.</given-names></name></person-group><year>2014</year><page-range>314-347,</page-range></element-citation></ref><ref id="BIBR-8"><element-citation publication-type="article-journal"><article-title>Big data analytics and application for logistics and supply chain management</article-title><source>Transp Res E Logist Transp Rev</source><person-group person-group-type="author"><name><surname>Govindan</surname><given-names>K.</given-names></name><name><surname>Cheng</surname><given-names>T.C.E.</given-names></name><name><surname>Mishra</surname><given-names>N.</given-names></name><name><surname>Shukla</surname><given-names>N.</given-names></name></person-group><year>2018</year><page-range>343-349,</page-range></element-citation></ref><ref id="BIBR-9"><element-citation publication-type=""><article-title>Pengaruh Religiusitas dan Rasionalisasi Terhadap Pendeteksian Kecurangan pada PT. PLN (Persero) ULP Kota Palopo</article-title><person-group person-group-type="author"><name><surname>Fadilah</surname><given-names>N.</given-names></name><name><surname>Patra</surname><given-names>I.K.</given-names></name><name name-style="given-only"><given-names>Rahmawati</given-names></name></person-group><year>2020</year></element-citation></ref><ref id="BIBR-10"><element-citation publication-type="article-journal"><article-title>Fraud Detection: Religion In The Workplace Big Data Analytics</article-title><source>Jurnal Akuntansi</source><person-group person-group-type="author"><name><surname>Bandiyono</surname><given-names>A.</given-names></name></person-group><year>2023</year><month>06</month><day/></element-citation></ref><ref id="BIBR-11"><element-citation publication-type="article-journal"><article-title>The Effect of Red Flags, Auditor’s Competence, Religiusity and Professional Skepticism on The Ability of Internal Auditors in Detecting Fraud</article-title><source>Digital Business Journal</source><volume>1</volume><issue>1</issue><person-group person-group-type="author"><name><surname>Suci</surname><given-names>C.F.</given-names></name><name><surname>Putra</surname><given-names>R.S.</given-names></name><name><surname>Syaf</surname><given-names>R.</given-names></name></person-group><year>2022</year><month>07</month><day/></element-citation></ref><ref id="BIBR-12"><element-citation publication-type="article-journal"><article-title>Pengaruh Pengalaman Kerja, Religiusitas dan Skeptisme Profesional Terhadap Kemampuan Auditor Internal dalam Mendeteksi Kecurangan (Studi Pada Kantor Inspektorat Kabupaten Buton Tengah dan Kabupaten Buton Selatan</article-title><source>Jurnal Akademik Pendidikan Ekonomi</source><volume>6</volume><person-group person-group-type="author"><name name-style="given-only"><given-names>Afriana</given-names></name></person-group><year>2019</year><month>11</month><day/></element-citation></ref><ref id="BIBR-13"><element-citation publication-type=""><article-title>Computer Aided Audit Techniques and Fraud Detection</article-title><volume>4</volume><person-group person-group-type="author"><name><surname>Olasanmi</surname><given-names>O.O.</given-names></name></person-group><year>2013</year></element-citation></ref><ref id="BIBR-14"><element-citation publication-type="article-journal"><article-title>Pengaruh Kompetensi, Profesionalisme, dan Pengalaman Audit Terhadap Kemampuan Auditor Badan Pemeriksa Keuangan (BPK) dalam Mendeteksi Fraud dengan Teknik Audit Berbantuan Komputer (TABK) Sebagai Variabel Moderasi</article-title><source>Media Riset Akuntansi, Auditing &amp; Informasi</source><volume>16</volume><person-group person-group-type="author"><name><surname>Atmaja</surname><given-names>D.</given-names></name></person-group><year>2016</year><month>04</month><day/></element-citation></ref><ref id="BIBR-15"><element-citation publication-type="article-journal"><article-title>Pengaruh Independensi, Pengalaman, dan Penerapan Teknik Audit Berbantuan Komputer (TABK) terhadap Efektivitas Pelaksanaan Audit Investigatif dalam Mendeteksi Kecurangan</article-title><source>Jurnal Akuntansi, Perpajakan dan Auditing</source><volume>1</volume><person-group person-group-type="author"><name><surname>Fauzi</surname><given-names>M.R.</given-names></name><name><surname>Anwar</surname><given-names>C.</given-names></name><name><surname>Ulupui</surname><given-names>I.G.K.A.</given-names></name></person-group><year>2020</year><month>06</month><day/><page-range>1-15,</page-range></element-citation></ref><ref id="BIBR-16"><element-citation publication-type=""><article-title>Effect of Computer Assisted Audit Tools on Corporate Sustainability</article-title><person-group person-group-type="author"><name><surname>Samagaio</surname><given-names>A.</given-names></name><name><surname>Diogo</surname><given-names>T.A.</given-names></name></person-group><year>2022</year></element-citation></ref><ref id="BIBR-17"><element-citation publication-type=""><article-title>Computer-Assisted Audit Techniques (CAATs) for Financial Fraud Detection: A Qualitative Approach</article-title><person-group person-group-type="author"><name><surname>Widuri</surname><given-names>R.</given-names></name><name><surname>Gautama</surname><given-names>Y.</given-names></name></person-group><year>2020</year></element-citation></ref><ref id="BIBR-18"><element-citation publication-type="article-journal"><article-title>Teknologi Informasi dan Skeptisme Profesional terhadap Fraud Detection Skills Auditor Internal Pemerintah</article-title><source>YUME   : Journal of Management</source><person-group person-group-type="author"><name><surname>Kamal</surname><given-names>A.</given-names></name></person-group><year>2022</year><page-range>295-313,</page-range></element-citation></ref><ref id="BIBR-19"><element-citation publication-type="article-journal"><article-title>Pengaruh Kompetensi Auditor dan Pemanfaatan Teknologi Informasi Terhadap Pendeteksian Fraud</article-title><source>Jurnal Akuntansi Trisakti</source><volume>9</volume><issue>1</issue><person-group person-group-type="author"><name><surname>Choirunnisa</surname><given-names>R.</given-names></name><name><surname>Rufaedah</surname><given-names>Y.</given-names></name></person-group><year>2022</year><month>02</month><day/></element-citation></ref><ref id="BIBR-20"><element-citation publication-type="article-journal"><article-title>Pengaruh Pengalaman Audit, Beban Kerja, Task Specifi Knowledge Terhadap Pendeteksian Kecurangan Laporan Keuangan (Studi pada KAP di Sumater Bagian Selatan</article-title><source>Jurnal Manajemen dan Bisnis Sriwijaya</source><volume>13</volume><person-group person-group-type="author"><name><surname>Yusrianti</surname><given-names>H.</given-names></name></person-group><year>2015</year></element-citation></ref><ref id="BIBR-21"><element-citation publication-type=""><year>2019</year></element-citation></ref><ref id="BIBR-22"><element-citation publication-type="chapter"><article-title>Determinan Pendeteksian Fraud Pada KAP di Surakarta</article-title><source>Jurnal Manajemen, Ekonomi, Keuangan dan Akuntansi (MEKA</source><person-group person-group-type="author"><name><surname>Lembayung</surname><given-names>H.D.</given-names></name><name><surname>Chomsatu</surname><given-names>Y.</given-names></name></person-group><year>2021</year><page-range>253-260,</page-range></element-citation></ref><ref id="BIBR-23"><element-citation publication-type="article-journal"><article-title>Fraud Detection: Intentionality and Deception in Cognition</article-title><source>Accounting, Organizations and Society</source><volume>18</volume><issue>5</issue><person-group person-group-type="author"><name><surname>Johnson</surname><given-names>P.E.</given-names></name><name><surname>Grazioli</surname><given-names>S.</given-names></name><name><surname>Karim</surname><given-names>Jamal</given-names></name></person-group><year>1993</year><month>07</month><day/><page-range>467-488,</page-range></element-citation></ref><ref id="BIBR-24"><element-citation publication-type="article-journal"><article-title>The Effects of Experience and Task-Specific Knowledge on Auditors’ Performance in Assesing a Fraud Case</article-title><source>Jurnal Akuntansi dan Auditing Indonesia</source><volume>8</volume><issue>1</issue><person-group person-group-type="author"><name><surname>Tirta</surname><given-names>R.</given-names></name><name><surname>Sholihin</surname><given-names>M.</given-names></name></person-group><year>2004</year><month>06</month><day/></element-citation></ref><ref id="BIBR-25"><element-citation publication-type="article-journal"><article-title>The Effect of Task Specific Knowledge in Fraud Detection Skill: Internal Audit Effectiveness as A Intervening Variable On BPK Representative of Riau and Kepri Province</article-title><source>Jurnal Riset dan Pengembangan Ekonomi Islam</source><volume>3</volume><issue>2</issue><person-group person-group-type="author"><name name-style="given-only"><given-names>Sari</given-names></name></person-group><year>2019</year></element-citation></ref><ref id="BIBR-26"><element-citation publication-type="article-journal"><article-title>Red Flags, Task Specific Knowledge dan Kemampuan Auditor dalam Mendeteksi Kecurangan</article-title><source>Jurnal Ekonomi Pembangunan</source><volume>6</volume><issue>2</issue><person-group person-group-type="author"><name name-style="given-only"><given-names>Muzdalifah</given-names></name><name><surname>Syamsu</surname><given-names>N.</given-names></name></person-group><year>2020</year><page-range>92-101,</page-range></element-citation></ref><ref id="BIBR-27"><element-citation publication-type="article-journal"><article-title>Pendeteksian Fraud: Peran Big Data dan Audit Forensik</article-title><source>Jurnal Aset (Akuntansi Riset</source><volume>12</volume><issue>2</issue><person-group person-group-type="author"><name><surname>Syahputra</surname><given-names>B.E.</given-names></name><name><surname>Afnan</surname><given-names>A.</given-names></name></person-group><year>2020</year><page-range>301-316,</page-range></element-citation></ref><ref id="BIBR-28"><element-citation publication-type="article-journal"><article-title>The Impact of Big Data Analytics and Forensic Audit in Fraud Detection</article-title><source>International Workshop on Computer Science and Engineering</source><volume>12</volume><person-group person-group-type="author"><name><surname>Handoko</surname><given-names>B.L.</given-names></name><name><surname>Rosita</surname><given-names>A.</given-names></name><name><surname>Ayuanda</surname><given-names>N.</given-names></name><name><surname>Budiarto</surname><given-names>A.Y.</given-names></name></person-group><year>2022</year></element-citation></ref><ref id="BIBR-29"><element-citation publication-type="article-journal"><article-title>Dampak Pemanfaatan Big Data dan Audit Forensik dalam Pendeteksian Fraud</article-title><source>Jurnal Ilmiah Multidisiplin</source><volume>1</volume><issue>9</issue><person-group person-group-type="author"><name name-style="given-only"><given-names>Surono</given-names></name></person-group><year>2023</year><month>10</month><day/><page-range>103-111,</page-range></element-citation></ref><ref id="BIBR-30"><element-citation publication-type="article-journal"><article-title>The Effect of Auditor Experience, Big Data and Forensic Audit as Mediating Variables on Fraud Detection</article-title><source>J Theor Appl Inf Technol</source><volume>101</volume><issue>6</issue><person-group person-group-type="author"><name><surname>Sembiring</surname><given-names>F.N.B.</given-names></name><name><surname>Widuri</surname><given-names>R.</given-names></name></person-group><year>2023</year></element-citation></ref><ref id="BIBR-31"><element-citation publication-type="article-journal"><article-title>User Acceptance of Information Technology: Toward a Unified View</article-title><source>MIS QUARTERLY</source><volume>27</volume><issue>3</issue><person-group person-group-type="author"><name><surname>Venkatesh</surname><given-names>V.</given-names></name><name><surname>Morris</surname><given-names>M.G.</given-names></name><name><surname>Davis</surname><given-names>F.D.</given-names></name></person-group><year>2003</year><month>09</month><day/><page-range>425-478,</page-range></element-citation></ref><ref id="BIBR-32"><element-citation publication-type="book"><article-title>A theory of cognitive dissonance</article-title><person-group person-group-type="author"><name><surname>Festinger</surname><given-names>L.</given-names></name></person-group><year>1957</year><publisher-name>Stanford University Press</publisher-name></element-citation></ref><ref id="BIBR-33"><element-citation publication-type="book"><article-title>The psychology of interpersonal relations</article-title><person-group person-group-type="author"><name><surname>Heider</surname><given-names>F.</given-names></name></person-group><year>1958</year><publisher-name>John Wiley &amp; Sons Inc</publisher-name><publisher-loc>Hoboken</publisher-loc><pub-id pub-id-type="doi">10.1037/10628-000</pub-id></element-citation></ref><ref id="BIBR-34"><element-citation publication-type="book"><article-title>Social Cognition</article-title><person-group person-group-type="author"><name><surname>Fiske</surname><given-names>S.T.</given-names></name><name><surname>Taylor</surname><given-names>S.E.</given-names></name></person-group><year>1991</year><publisher-name>Mcgraw-Hill Book Company</publisher-name><publisher-loc>Newyork</publisher-loc></element-citation></ref><ref id="BIBR-35"><element-citation publication-type="book"><article-title>Akuntansi Forensik dan Audit Investigatif</article-title><person-group person-group-type="author"><name name-style="given-only"><given-names>Betri</given-names></name></person-group><year>2022</year><publisher-name>NoerFikri</publisher-name><publisher-loc>Palembang</publisher-loc></element-citation></ref><ref id="BIBR-36"><element-citation publication-type=""><article-title>‘Deteksi,’” Badan Pengembangan dan Pembinaan Bahasa, Kementerian Pendidikan, Kebudayaan</article-title><person-group person-group-type="author"><name><surname>Daring</surname><given-names>K.B.B.I.</given-names></name></person-group><publisher-name>dan Teknologi Republik Indonesia</publisher-name></element-citation></ref><ref id="BIBR-37"><element-citation publication-type="book"><article-title>Forensic Fraud</article-title><person-group person-group-type="author"><name name-style="given-only"><given-names>Karyono</given-names></name></person-group><year>2013</year><publisher-name>CV. Andi</publisher-name><publisher-loc>Yogjakarta</publisher-loc></element-citation></ref><ref id="BIBR-38"><element-citation publication-type="book"><person-group person-group-type="author"><name><surname>Ghufron</surname><given-names>M.N.</given-names></name><name><surname>Risnawati</surname><given-names>Teori-teori Psikologi</given-names></name></person-group><year>2012</year><publisher-name>Ar-Ruzz Media</publisher-name><publisher-loc>Yogjakarta</publisher-loc></element-citation></ref><ref id="BIBR-39"><element-citation publication-type=""/></ref><ref id="BIBR-40"><element-citation publication-type="article-journal"><article-title>Computer‐assisted audit tools and techniques: analysis and perspectives</article-title><source>Managerial Auditing Journal</source><volume>18</volume><issue>9</issue><person-group person-group-type="author"><name><surname>Braun</surname><given-names>R.L.</given-names></name><name><surname>Davis</surname><given-names>H.E.</given-names></name></person-group><year>2003</year><page-range>725-731,</page-range></element-citation></ref><ref id="BIBR-41"><element-citation publication-type="article-journal"><article-title>An empirical analysis of fraud detection likelihood</article-title><source>Managerial Auditing Journal</source><volume>11</volume><issue>3</issue><person-group person-group-type="author"><name><surname>Moyes</surname><given-names>G.D.</given-names></name><name><surname>Hasan</surname><given-names>I.</given-names></name></person-group><year>1996</year></element-citation></ref><ref id="BIBR-42"><element-citation publication-type=""><article-title>Big data: A review</article-title><person-group person-group-type="author"><name><surname>Sağiroğlu</surname><given-names>Ş.</given-names></name><name><surname>Sinanc</surname><given-names>D.</given-names></name></person-group><year>2013</year></element-citation></ref><ref id="BIBR-43"><element-citation publication-type="article-journal"><article-title>Data Analytics: Keterampilan Teknik Akuntan dan Auditor di Era Digital</article-title><source>Madza Media</source><person-group person-group-type="author"><name><surname>Perdana</surname><given-names>A.</given-names></name></person-group><year>2020</year></element-citation></ref><ref id="BIBR-44"><element-citation publication-type="book"><article-title>Sistem Informasi Akuntansi</article-title><person-group person-group-type="author"><name><surname>Zamzami</surname><given-names>F.</given-names></name><name><surname>Nusa</surname><given-names>N.Duta</given-names></name><name><surname>Arifin</surname><given-names>F.I.</given-names></name></person-group><year>2021</year><publisher-name>UGM Press</publisher-name></element-citation></ref><ref id="BIBR-45"><element-citation publication-type="article-journal"><article-title>Hubungan antara Religiusitas dengan Penyesuaian Diri pada Siswa dan Siswi Kelas VII Yayasan Pondok Pesantren Futuhiyyah Mranggen Kabupaten Demak</article-title><source>Jurnal empati</source><volume>6</volume><issue>14</issue><person-group person-group-type="author"><name><surname>Lestari</surname><given-names>D.</given-names></name><name><surname>Indrawati</surname><given-names>E.S.</given-names></name></person-group><year>2017</year><page-range>307-312,</page-range></element-citation></ref><ref id="BIBR-46"><element-citation publication-type="article-journal"><article-title>Smarter fraud investigations with big data analytics</article-title><source>Network Security</source><issue>12</issue><person-group person-group-type="author"><name><surname>Hipgrave</surname><given-names>S.</given-names></name></person-group><year>2013</year></element-citation></ref><ref id="BIBR-47"><element-citation publication-type="article-journal"><article-title>Evaluating Structural Equation Models with Unobservable Variables and Measurement Error</article-title><source>Journal of Marketing Research</source><volume>18</volume><issue>1</issue><person-group person-group-type="author"><name><surname>Fornell</surname><given-names>C.</given-names></name><name><surname>Larcker</surname><given-names>D.F.</given-names></name></person-group><year>1981</year><month>02</month><day/><page-range>39,</page-range><pub-id pub-id-type="doi">10.2307/3151312</pub-id></element-citation></ref><ref id="BIBR-48"><element-citation publication-type="article-journal"><article-title>Convergent and discriminant validation by the multitrait-multimethod matrix</article-title><source>Psychol Bull</source><volume>56</volume><issue>2</issue><person-group person-group-type="author"><name><surname>Campbell</surname><given-names>D.T.</given-names></name><name><surname>Fiske</surname><given-names>D.W.</given-names></name></person-group><year>1959</year><page-range>81-105,</page-range><pub-id pub-id-type="doi">10.1037/h0046016</pub-id></element-citation></ref><ref id="BIBR-49"><element-citation publication-type="article-journal"><article-title>Partial Least Squares Structural Equation Modeling: Rigorous Applications, Better Results and Higher Acceptance</article-title><source>Long Range Plann</source><volume>46</volume><issue>1–2</issue><person-group person-group-type="author"><name><surname>Hair</surname><given-names>J.F.</given-names></name><name><surname>Ringle</surname><given-names>C.M.</given-names></name><name><surname>Sarstedt</surname><given-names>M.</given-names></name></person-group><year>2013</year><month>02</month><day/><page-range>1-12,</page-range><pub-id pub-id-type="doi">10.1016/j.lrp.2013.01.001</pub-id></element-citation></ref><ref id="BIBR-50"><element-citation publication-type="article-journal"><article-title>A Primer on Partial Least Squares Structural Equation Modeling</article-title><source>Long Range Plann</source><volume>46</volume><issue>1–2</issue><person-group person-group-type="author"><name><surname>Ketchen</surname><given-names>D.J.</given-names></name></person-group><year>2013</year><month>02</month><day/><page-range>184-185,</page-range><pub-id pub-id-type="doi">10.1016/j.lrp.2013.01.002</pub-id></element-citation></ref><ref id="BIBR-51"><element-citation publication-type="book"><article-title>Structural Equations with Latent Variables</article-title><person-group person-group-type="author"><name><surname>Bollen</surname><given-names>K.A.</given-names></name></person-group><year>1989</year><publisher-name>Wiley</publisher-name><pub-id pub-id-type="doi">10.1002/9781118619179</pub-id></element-citation></ref><ref id="BIBR-52"><element-citation publication-type="book"><article-title>A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM</article-title><year>2022</year><publisher-name>SAGE Publications, Inc</publisher-name><publisher-loc>United States of America</publisher-loc></element-citation></ref></ref-list></back></article>
