Please use this identifier to cite or link to this item: http://hdl.handle.net/1942/28118
Full metadata record
DC FieldValueLanguage
dc.contributor.authorHOSSEINPOUR, Mehrnush-
dc.contributor.authorJANS, Mieke-
dc.date.accessioned2019-05-03T08:19:15Z-
dc.date.available2019-05-03T08:19:15Z-
dc.date.issued2019-
dc.identifier.citation42nd Annual congress of the European Accounting Association, Paphos, Cyprus, May 29-31, 2019-
dc.identifier.urihttp://hdl.handle.net/1942/28118-
dc.description.abstractContinuous auditing is introduced as a method of auditing to provide assurance on a full population of data in real-time or in near-real time by applying data analytics. However, applying currently existing data analysis techniques in an auditing setting has some limitations. First, the number of alarming cases detected by continuous auditing projects is too large to examine completely and secondly, the current algorithm provide the output as a set of deviations. This set is provided a too technical language, which is not per defi nition of interest to an auditor. In this paper, we address the latter drawback: when an auditor is confronted with deviating transactions (like a missing approval), how does the auditor classify these deviations? Is there a speci c set of categories that the auditor uses to group these deviations? We conducted a literature study to extract a set of deviation categories from the existing theory in business process management. Then by conducting a fi eld study, we confronted auditors with 82 process deviation in total. Having more insights in how they perceive these deviations and attribute characteristics to them, will enable future research to map the large number of deviations in sets of deviation types that are aligned with how the auditor perceives deviations. The results of our study suggest that auditors broadly categorize deviations in three groups: activities that are missing, activities that are reordered, and activities that are repeated. This fi nding is to a large extent consistent with literature in the business process management domain. However, one primary group of deviations in the business process management literature, activities that are inserted, does not seem to be used actively by auditors. These ndings may have implications for the acceptability of certain data analysis techniques by auditors.-
dc.language.isoen-
dc.subject.otherDeviation Identi cation; Deviation Categorization; Continuous Auditing; Process Mining; Conformance Checking; Deviation Analysis-
dc.titleProcess Deviation Categories in an Auditing Context-
dc.typeConference Material-
local.bibliographicCitation.conferencedate2019, May 29-31-
local.bibliographicCitation.conferencename42nd Annual congress of the European Accounting Association-
local.bibliographicCitation.conferenceplacePaphos, Cyprus-
local.bibliographicCitation.jcatC2-
dc.relation.referencesIaasb: International federation of accountants, international standard on auditing 530. URL http://www.ifac.org/system/files/downloads/ a027-2010-iaasb-handbook-isa-530.pdf. Adriansyah, A., van Dongen, B. F., and Zannone, N. Controlling break-the-glass through alignment. Social Computing (SocialCom), IEEE International Con- ference on Privacy, Security, Risk and Trust, 2010. doi: 10.1109/SocialCom. 2013.91. Adriansyah, A., van Dongen, B. F., and van der Aalst, W. M. Conformance checking using cost-based tness analysis. In Enterprise Distributed Object Computing Conference (EDOC), 2011 15th IEEE International, pages 55{64. IEEE Computer Society, 2011. Alles, M., Brennan, G., Kogan, A., and Vasarhelyi, M. A. Continuous monitoring of business process controls: A pilot implementation of a continuous auditing system at siemens. International Journal of Accounting Information Systems, 7(2):137{161, 2006a. Alles, M. G., Tostes, F., Vasarhelyi, M. A., and Riccio, E. L. Continuous auditing: the usa experience and considerations for its implementation in brazil. JISTEM-Journal of Information Systems and Technology Management, 3(2): 211{224, 2006b. Alles, M. G., Kogan, A., and Vasarhelyi, M. A. Putting continuous auditing theory into practice: Lessons from two pilot implementations. Journal of In- formation Systems, 22(2):195{214, 2008. Boeije, H. A purposeful approach to the constant comparative method in the analysis of qualitative interviews. Quality and quantity, 36(4):391{409, 2002. Braun, R. L. and Davis, H. E. Computer-assisted audit tools and techniques: Analysis and perspectives. Managerial Auditing Journal, 18(9):725{731, 2003. Chan, D. Y. and Vasarhelyi, M. A. Innovation and practice of continuous auditing. International Journal of Accounting Information Systems, 12(2):152{160, 2011. De Weerdt, J., De Backer, M., Vanthienen, J., and Baesens, B. A multidimensional quality assessment of state-of-the-art process discovery algorithms using real-life event logs. Inf. Syst., 37(7):654{676, November 2012. ISSN 0306- 4379. doi: 10.1016/j.is.2012.02.004. URL http://dx.doi.org/10.1016/j. is.2012.02.004. Debreceny, R. and Rahman, A. Firm-speci c determinants of continuous corporate disclosures. The International Journal of Accounting, 40(3):249{278, 2005. Debreceny, R., Gray, G. L., Tham, W.-L., Goh, K.-Y., and Tang, P.-L. The development of embedded audit modules to support continuous monitoring in the electronic commerce environment. International Journal of Auditing, 7 (2):169{185, 2003. Dempster, A. P. Upper and lower probabilities induced by a multivalued mapping. The annals of mathematical statistics, pages 325{339, 1967. Dull, R. B., Tegarden, D. P., and Schleifer, L. L. Actve: A proposal for an automated continuous transaction veri cation environment. Journal of Emerging Technologies in Accounting, 3(1):81{96, 2006. Eisenhardt, K. M. Building theories from case study research. Academy of management review, 14(4):532{550, 1989. Elliott, R. K. Twenty- rst century assurance. Auditing: A Journal of Practice & Theory, 21(1):139{146, 2002. Fahland, D. and van der Aalst, W. M. Model repair - aligning process models to reality. Inf. Syst., 47(C):220{243, January 2015. ISSN 0306-4379. doi: 10.1016/ j.is.2013.12.007. URL http://dx.doi.org/10.1016/j.is.2013.12.007. Flowerday, S. and Von Solms, R. Continuous auditing: verifying information integrity and providing assurances for nancial reports. Computer Fraud & Security, 2005(7):12{16, 2005. Garc a-Ba~nuelos, L., van Beest, N. R., Dumas, M., and La Rosa, M. Complete and interpretable conformance checking of business processes. BPM center, pages 1{23, 2015. Gioia, D. A., Corley, K. G., and Hamilton, A. L. Seeking qualitative rigor in inductive research: Notes on the gioia methodology. Organizational Research Methods, 16(1):15{31, 1 2013. ISSN 1094-4281. doi: 10.1177/ 1094428112452151. Groomer, S. M. and Murthy, U. S. Continuous auditing of database applications: An embedded audit module approach. Journal of Information Systems, 3(2): 53{69, 1989. Hosseinpour, M. and Jans, M. Categorizing identi ed deviations for auditing. In Proceedings of the 6th International Symposium on Data-driven Process Discovery and Analysis (SIMPDA 2016), pages 125{129, 2016. URL http: //ceur-ws.org/Vol-1757. Issa, H. Exceptional exceptions. PhD thesis, Rutgers University-Graduate School-Newark, 2013. James A, R. Report to the nations on occupational fraud and abuse:2016 global fraud study. Association of Certi ed Fraud Examiners, 2016. URL http: //www.acfe.com/rttn2016/docs/2016-report-to-the-nations.pdf. Jans, M., Van Der Werf, J. M., Lybaert, N., and Vanhoof, K. A business process mining application for internal transaction fraud mitigation. Expert System Applications, 38(10):13351{13359, 2011. doi: 10.1016/j.eswa.2011.04.159. URL http://dx.doi.org/10.1016/j.eswa.2011.04.159. Jans, M., Alles, M. G., and Vasarhelyi, M. A. The case for process mining in auditing: Sources of value added and areas of application. International Journal of Accounting Information Systems 14, 14:1{20, March 2013. Jans, M., Alles, M. G., and Vasarhelyi, M. A. A eld study on the use of process mining of event logs as an analytical procedure in auditing. The Accounting Review, 89(5):1751{1773, September 2014. Johannesson, P. and Perjons, E. An introduction to design science. Springer, 2014. 38 Kim, Y. and Vasarhelyi, M. A. A model to detect potentially fraudulent/ abnormal wires of an insurance company: An unsupervised rule-based approach. Journal of Emerging Technologies in Accounting, 9(1):95{110, 2012. Koch, H. S. Online computer auditing through continuous and intermittent simulation. MIS Quarterly, pages 29{41, 1981. Kogan, A., Sudit, E. F., and Vasarhelyi, M. A. Continuous online auditing: A program of research. Journal of Information Systems, 13(2):87{103, 1999. Kuenkaikaew, S. and Vasarhelyi, M. A. The predictive audit framework. The International Journal of Digital Accounting Research, 13:37{71, 2013. Kuhn Jr, J. R. and Sutton, S. G. Continuous auditing in erp system environments: The current state and future directions. Journal of Information Systems, 24(1):91{112, 2010. Li, P., Chan, D. Y., and Kogan, A. Exception prioritization in the continuous auditing environment: A framework and experimental evaluation. Journal of Information Systems, 30(2):135{157, 2015. Malsch, B. and Salterio, S. E. doing good eld research: Assessing the quality of audit eld research. Auditing: A Journal of Practice & Theory, 35(1):1{22, 2015. McCarthy, W. E. The rea accounting model: A generalized framework for accounting systems in a shared data environment. Accounting Review, pages 554{578, 1982. Mendling, J., Neumann, G., and van der Aalst, W. M. P. Understanding the occurrence of errors in process models based on metrics. In On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS, OTM Confederated International Conferences CoopIS,DOA, ODBASE, GADA, and IS, pages 113{130, 2007. Miles, M. B. and Huberman, A. M. Qualitative data analysis: An expanded sourcebook. sage, 1994. Needleman, S. B. and Wunsch, C. D. A general method applicable to the search for similarities in the amino acid sequence of two proteins. Journal of Molec- ular Biology, 48(3):443{453, 1970. doi: 10.1016/0022-2836(70)90057-4. Perols, J. L. and Murthy, U. S. Information fusion in continuous assurance. Journal of Information Systems, 26(2):35{52, 2012. Phua, C., Lee, V., Smith, K., and Gayler, R. A comprehensive survey of data mining-based fraud detection research. arXiv preprint arXiv:1009.6119, 2010. Rei ner, D., Conforti, R., Dumas, M., La Rosa, M., and Armas-Cervantes, A. Scalable conformance checking of business processes. In OTM Confederated International Conferences" On the Move to Meaningful Internet Systems", pages 607{627. Springer, 2017. Rezaee, Z., Sharbatoghlie, A., Elam, R., and McMickle, P. L. Continuous auditing: Building automated auditing capability. Auditing: A Journal of Practice & Theory, 21(1):147{163, 2002. Rozinat, A. and van der Aalst, W. M. Conformance checking of processes based on monitoring real behavior. Information Systems, 33(1):64{95, 2008. Russell, N., van der Aalst, W. M., and ter Hofstede, A. H. Exception handling patterns in process-aware information systems. BPM Center Report BPM, pages 288{302, 2006. 39 Sadiq, S., Governatori, G., and Namiri, K. Modeling control objectives for business process compliance. In International conference on business process man- agement, pages 149{164. Springer, 2007. Salda~na, J. The coding manual for qualitative researchers. SAGE London, 3 edition, 2016. ISBN 9781473902497. Saunders, M. N. Research methods for business students, 5/e. Pearson Education India, 2011. Seale, C. Quality in qualitative research. Qualitative inquiry, 5(4):465{478, 1999. Shafer, G. A mathematical theory of evidence, volume 42. Princeton university press, 1976. Singh, K., Best, P. J., Bojilov, M., and Blunt, C. Continuous auditing and continuous monitoring in erp environments: case studies of application implementations. Journal of Information Systems, 28(1):287{310, 2013. Strauss, A. L. Qualitative analysis for social scientists. Cambridge University Press, 1987. ISBN 0521338069. Stringer, E. T. Action research. Thousand Oaks, California : SAGE, 4 edition, 2014. ISBN 9781452205083. Thiprungsri, S. and Vasarhelyi, M. A. Cluster analysis for anomaly detection in accounting data: An audit approach. International Journal of Digital Ac- counting Research, 11, 2011. Vasarhelyi, M. A. Continuous Assurance for the Now Economy. PhD thesis, Rutgers Business School, 2010. Vasarhelyi, M. A. and Halper, F. B. The continuous audit of online systems. In Auditing: A Journal of Practice and Theory. Citeseer, 1991. Vasarhelyi, M. A., Kogan, A., and Alles, M. G. Would continuous auditing have prevented the enron mess? CPA JOURNAL, 72(7):80{80, 2002. Weber, B., Reichert, M., and Rinderle-Ma, S. Change patterns and change support features{enhancing exibility in process-aware information systems. Data & knowledge engineering, 66(3):438{466, 2008. Willig, C. Introducing qualitative research in psychology. McGraw-Hill Education (UK), 2013. Wilson, J. Essentials of business research: A guide to doing your research project. Sage, 2014.-
local.type.refereedRefereed-
local.type.specifiedConference Material-
item.contributorHOSSEINPOUR, Mehrnush-
item.contributorJANS, Mieke-
item.fullcitationHOSSEINPOUR, Mehrnush & JANS, Mieke (2019) Process Deviation Categories in an Auditing Context. In: 42nd Annual congress of the European Accounting Association, Paphos, Cyprus, May 29-31, 2019.-
item.accessRightsRestricted Access-
item.fulltextWith Fulltext-
Appears in Collections:Research publications
Files in This Item:
File Description SizeFormat 
Process deviation categories in an auditing context (2).pdf
  Restricted Access
Conference material814.79 kBAdobe PDFView/Open    Request a copy
Show simple item record

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.