Watch this video on YouTube
You are an information system auditor of HDA Inc. You are auditing the post-implementation of an application system. In this context, which of the following factors is most likely to compromise the independence of the IS auditor?