Please use this identifier to cite or link to this item: http://hdl.handle.net/1942/28125
Full metadata record
DC FieldValueLanguage
dc.contributor.authorChiu, Tiffany-
dc.contributor.authorJANS, Mieke-
dc.date.accessioned2019-05-03T10:42:31Z-
dc.date.available2019-05-03T10:42:31Z-
dc.date.issued2019-
dc.identifier.citationAccounting Horizons, 33 (3), p. 141-156-
dc.identifier.issn0888-7993-
dc.identifier.urihttp://hdl.handle.net/1942/28125-
dc.description.abstractUnlike traditional audit techniques, process mining of event logs provides a new aspect for auditing by tracking and capturing every single routing in the dataset. This paper aims at adopting process mining to evaluate the effectiveness of internal control using a real-life event log from a large European bank. Specifically, the evaluation is based on the full population of event logs and contains four analyses: (1) variant analysis that identifies acceptable and notable variants, (2) segregation of duty analysis that examines process instances and employees that violate segregation of duty controls, (3) personnel analysis that investigates employees who are involved in multiple potential control violations, and (4) timestamp analysis that detects time related issues such as the ones performed during the weekends and process instances that have lengthy process duration. The results from the case study indicate that process mining could assist auditors in identifying audit-relevant issues such as notable variants, activities performed during the weekends and personnel violating segregation of duty controls or involved in multiple violations..., etc. By examining the entire population of event logs, process mining enables auditors to detect potential risks, ineffective internal controls, and inefficient processes. Therefore, process mining of event logs generates a new type of audit evidence and could potentially revolutionize the traditional audit procedure.-
dc.language.isoen-
dc.subject.otherprocess mining-
dc.subject.otherinternal control-
dc.subject.otherauditing-
dc.subject.otherevent logs-
dc.subject.othervariants-
dc.titleProcess Mining of event logs: a case study evaluating internal control effectiveness-
dc.typeJournal Contribution-
dc.identifier.epage156-
dc.identifier.issue3-
dc.identifier.spage141-
dc.identifier.volume33-
local.bibliographicCitation.jcatA1-
dc.description.notesChiu, T (reprint author), Ramapo Coll, Mahwah, NJ 07430 USA. Univ Hasselt, Hasselt, Belgium-
dc.relation.referencesAlles, M., M. Jans, and M.A. Vasarhelyi. 2011. Process mining: a new research methodology for ais. SSRN Electronic Journal. 10.2139/ssrn.1746926. Chiu, T., Y. Wang, and M.A. Vasarhelyi. 2017. A framework of applying process mining for fraud scheme detection. Working paper, Rutgers University. Chiu, T., H. Brown-Liburd, and M.A. Vasarhelyi. 2018. What could go wrong? Performing tests of internal controls using process mining. Working Paper. Issa, H. and A. Kogan. 2014. A predictive ordered logistic regression model as a tool for quality review of control risk assessments. Journal of Information Systems 28 (2): 209-229. Jans, M., M. Alles, and M. A. Vasarhelyi. 2010. Process mining of event logs in auditing: Opportunities and challenges. Available at SSRN: https://ssrn.com/abstract=2488737 or http://dx.doi.org/10.2139/ssrn.2488737. Jans, M., J.M. van Der Werf, N. Lybaert, and K. Vanhoof. 2011. A business process mining application for internal transaction fraud mitigation. Expert Systems with Applications 38 (10):13351-13359. Jans, M., M. Alles, and M.A. Vasarhelyi. 2013. The case for process mining in auditing: sources of value added and areas of application. International Journal of Accounting Information Systems 14 (1):1-20. Jans, M., M. Alles, and M. A. Vasarhelyi. 2014. A field study on the use of process mining of event logs as an analytical procedure in auditing. The Accounting Review 89 (5):1751-1773. Kim, Y. and M.A. Vasarhelyi. 2012. A model to detect potentially fraudulent/abnormal wires of an insurance company: an unsupervised rule-based approach. Journal of Emerging Technologies in Accounting 9 (1): 95-110. Kopp, L.S. and E. O'Donnell. 2005. The influence of a business-process focus on category knowledge and internal control evaluation. Accounting, Organizations and Society 30 (5): 423-434. Li, P., D. Y. Chan, and A. Kogan. 2016. Exception prioritization in the continuous auditing environment: A framework and experimental evaluation. Journal of Information Systems 30 (2): 135-157. Public Company Accounting Oversight Board (PCAOB). 2010a. Audit Evidence. Auditing Standard (AS) No. 1105. Washington, DC: PCAOB. Rozinat, A. and W.M.P. van der Aalst. 2006. Conformance testing: Measuring the fit and appropriateness of event logs and process models. Business Process Management Workshops (3812): 163-176. Rozinat, A., A.K.A. de Medeiros, C.W. Günther, A.J.M.M. Weijters, and W.M.P. van der Aalst. 2008. The need for a process mining evaluation framework in research and practice. Business Process Management Workshops, Springer. 4928: 84-89. Rozinat, A. and W.M.P. van der Aalst. 2008. Conformance checking of processes based on monitoring real behavior. Information Systems 33 (1): 64-95. Schimm, G. 2003. Mining most specific workflow models from event-based data. Business process management 2678: 1021-1021. U.S. House of Representatives. 2002. The Sarbanes-Oxley Act of 2002. Public Law 107-204 [H. R. 3763]. Washington, DC: Government Printing Office. van der Aalst, W.M.P, B.F. van Dongen, J. Herbst, L. Maruster, G. Schimm, and A.J.M.M. Weijters. 2003. Workflow mining: A survey of issues and approaches. Data & Knowledge Engineering 47 (2): 237-267. van der Aalst, W.M.P. and A.J.M.M Weijters. 2004. Process Mining: A Research Agenda. Computers in Industry 53: 231-244. van der Aalst, W.M.P. 2011. Process mining: Discovery, Conformance and Enhancement of Business Processes. Springer Verlag, Berlin (ISBN 978-3-642-19344-6). Vasarhelyi, M.A. and F.B. Halper. 1991. The Continuous Audit of Online Systems. Auditing: A Journal of Practice & Theory 10 (1): 110-125. Wen, L., J. Wang, W.M.P. van der Aalst, B. Huang, and J. Sun. 2009. A novel approach for process mining based on event types. Journal of Intelligent Information Systems 32 (2): 163–190. Yang, W. and S. Hwang. 2006. A process-mining framework for the detection of healthcare fraud and abuse. Expert Systems with Applications 31 (1): 56–68. Wood, J., W. Brown, and H. Howe. 2013. IT Auditing and Application Controls for Small and Mid-Sized Enterprises: Revenue, Expenditure, Inventory, Payroll, and More. John Wiley & Sons.  -
local.type.refereedRefereed-
local.type.specifiedArticle-
dc.identifier.doi10.2308/acch-52458-
dc.identifier.isi000488289300009-
dc.identifier.eissn1558-7975-
local.uhasselt.internationalyes-
item.contributorChiu, Tiffany-
item.contributorJANS, Mieke-
item.accessRightsRestricted Access-
item.fullcitationChiu, Tiffany & JANS, Mieke (2019) Process Mining of event logs: a case study evaluating internal control effectiveness. In: Accounting Horizons, 33 (3), p. 141-156.-
item.fulltextWith Fulltext-
crisitem.journal.issn0888-7993-
crisitem.journal.eissn1558-7975-
Appears in Collections:Research publications
Files in This Item:
File Description SizeFormat 
20190119_Horizons—18—113_Manuscript.docx
  Restricted Access
Peer-reviewed author version389.01 kBMicrosoft WordView/Open    Request a copy
untitled.pdf
  Restricted Access
Published version248.14 kBAdobe PDFView/Open    Request a copy
Show simple item record

SCOPUSTM   
Citations

1
checked on Sep 3, 2020

WEB OF SCIENCETM
Citations

18
checked on May 2, 2024

Page view(s)

372
checked on Sep 6, 2022

Download(s)

578
checked on Sep 6, 2022

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.