AIS in an age of Big Data
Vasarhelyi (2012a) discussed the need for accounting Information systems (AIS) to
accommodate business needs generated by rapid changes in technology. It was argued that …
accommodate business needs generated by rapid changes in technology. It was argued that …
Big Data and audit evidence
Big Data and Audit Evidence Page 1 JOURNAL OF EMERGING TECHNOLOGIES IN
ACCOUNTING American Accounting Association Vol. 12 DOI: 10.2308/jeta-10468 2015 pp …
ACCOUNTING American Accounting Association Vol. 12 DOI: 10.2308/jeta-10468 2015 pp …
Securing big data provenance for auditors: The big data provenance black box as reliable evidence
D Appelbaum - Journal of emerging technologies in …, 2016 - publications.aaahq.org
The purpose of this article is to highlight a main issue regarding reliable audit evidence
derived from Big Data—that of secure data provenance. Traditionally, audit evidence …
derived from Big Data—that of secure data provenance. Traditionally, audit evidence …
The remote audit
Audit practitioners have been progressively adopting communications and analytic
technology to extend the scope, change the timing, and reduce the costs of audit processes …
technology to extend the scope, change the timing, and reduce the costs of audit processes …
Process mining of event logs: A case study evaluating internal control effectiveness
This paper aims at adopting process mining to evaluate the effectiveness of internal control
using a real-life event log. Specifically, the evaluation is based on the full population of an …
using a real-life event log. Specifically, the evaluation is based on the full population of an …
[HTML][HTML] Using process mining as an assurance tool in the three-lines-model
One broadly accepted approach to structure the corporate governance of an organization is
the so called “Three-Lines-Model”(TLM), which consists of different assurance providers like …
the so called “Three-Lines-Model”(TLM), which consists of different assurance providers like …
A process deviation analysis–a case study
Processes are not always executed as expected. Deviations assure the necessary flexibility
within a company, but also increase possible internal control weaknesses. Since the number …
within a company, but also increase possible internal control weaknesses. Since the number …
Identifying the absence of effective internal controls: An alternative approach for internal control audits
Auditors face new challenges when auditing internal controls due to the increasing
integration of information systems for transaction processing and the growing amount of …
integration of information systems for transaction processing and the growing amount of …
[PDF][PDF] Process mining of event logs in internal auditing: a case study
In this paper we explore the value that the techniques of process mining can provide to
internal auditors by conducting a case study of the procurement process at a major …
internal auditors by conducting a case study of the procurement process at a major …
Behavioral and Performance Analysis of a Real-Time Case Study Event Log: A Process Mining Approach
Project-based organizations need to procure different commodities, and the failure/success
of a project depends heavily on procurement management. Companies must refine and …
of a project depends heavily on procurement management. Companies must refine and …