SlideShare a Scribd company logo
EXCEPTIONAL EXCEPTIONS
Hussein Issa
(Spring 2015)
BACKGROUND
Background
• Audit by Exception (Vasarhelyi and Halper, 1991)
• Continuous Auditing literature is rich with studies that propose
statistical and machine learning techniques to identify
exceptions (Dull et al., 2006; Groomer & Murthy, 1989a; Alexander Kogan et al.,
1999; Vasarhelyi & Halper, 1991)
• Problem?
• Result?
35/31/201534th WCARS
Large numbers of Exceptions!
-Information overload!
-Ambiguity
-Information relevance
Motivation & Contribution
Motivation:
• Prior continuous auditing research focused on detecting
exceptions efficiently
• We need to develop a classification hierarchy or ranking of
detected exceptions to limit the need for human intervention
Contribution:
• Fill the gap in the continuous auditing literature with regards to
providing the human users with assistance in dealing with
large number of exceptions
• Propose exceptions prioritization methodologies
45/31/201534th WCARS
Relevant Literature-Exceptional Exceptions
• Analysis usually yields large amounts of exceptions, causing
information overloads due to sub-optimal business processes
or over-conservative CA/CM system (Alles et al 2006, 2008 ;
Debreceny et al. 2003)
• Human users perform complex aggregation and processing
tasks poorly (Iselin, 1988; Kleinmunitz, 1990)
• Murthy 2012 emphasized the lack of and need for studies
addressing the problem of large numbers of exceptions
55/31/201534th WCARS
IDENTIFYING AND PRIORITIZING
IRREGULARITIES USING A RULE-
BASED MODEL WITH A WEIGHTING
SYSTEM DERIVED FROM EXPERTS’
KNOWLEDGE
Motivation, Research Questions, & Findings
Motivation:
• Plenty of studies for exception identification, few address processing
• Majority of expert systems assign the same weight to rules
• HOWEVER: business rules, and accordingly their violations, do not have
the same importance
Research Questions:
1. How can we integrate the judgment of the domain experts (in this case the
auditors) in a rule-based expert system?
2. How can we develop a weighting system for the various rules in that expert
system?
3. How can we use this weighting system to prioritize exceptions?
75/31/201534th WCARS
Suspicion Score
85/31/201534th WCARS
Rank
4
2
3
1
6
5
Framework
95/31/201534th WCARS
Framework
105/31/201534th WCARS
6
Rule-Based System
• Set of IF-THEN rules
• Popularity stems from simplicity, interpretability, flexibility
• Data: Simulated Order to Cash data
• Originally 33 analytics, narrowed down to 12 by experienced
auditors
• 12 analytics can be categorized as tests for:
– Segregation of duties
– Unauthorized transactions
– Missing documents
– Non-matching documents.
115/31/201534th WCARS
Rules Weights Inference
• Business rules and accordingly their violations, do not have
the same significance
• 28 participants with 3 and more years of experience:
– Conduct 17 pairwise comparisons
– Select the transaction they believe to present higher control risk
– Provide justification if their assessment
125/31/201534th WCARS
Customer
Transaction
ID
Custom
er ID
Invoice
Number
Invoice
Date
Created
by
Inventory
Item ID
Invoice
Selling
Price
Invoiced
Amount
Shipment
ID
Shipment
document
Created By
Shipment
document
Approved By
10034 1146
10001203 10/15/1997 1546 63
800
9600 10000877 1002 1546
4110 1000
10000262 3/1/1998 1117 628
600
1800
SOD Missing Values
(Orphaned invoices)
Rules Weight Inference-LP
• Special Case Linear Program
– 16 pairs
– Each transaction can violate one and only one
• General Case Linear Program
– 17 pairs
– One transaction violated two rules
135/31/201534th WCARS
Exceptions Identification & Prioritization
Identification:
• Apply expert system to the whole population to find all the records
that violate one or more rules
• Remaining records are assumed to be normal, thus presenting
negligible risk
Prioritization:
• Calculate the Suspicion Score for each exception such that:
145/31/201534th WCARS
Exceptions Prioritization-Example
155/31/201534th WCARS
Rank
4
2
3
1
6
5
Investigation & Feedback
Investigation:
• Auditors are provided with Prioritized exceptions
• Scope of investigation depends on their time/budget
constraints
Feedback:
• Helps adjusting the rules that make up the expert system.
• Enables us to modify the weights of the rules according to the
audit teams’ findings
– incorporated as a new set of constraints in the general case Model
• Effect of the original experiment will decrease over time with
more feedback from auditors
165/31/201534th WCARS
Weights –Special vs. General Models
175/31/201534th WCARS
• Excessive Write offs ranked highest
• SOD in general ranked low
• Rules with direct impact on financial numbers ranked high
• Operational controls ranked low
Analytic Special Case Model General Case Model
Weight Rank Weight Rank
Analytic_1_SOD_Customers 1.00 11 1.00 11
Analytic_2_Unauthorized_Sales_Order 2.86 2 2.71 3
Analytic_3_Unathorized_Price 1.38 9 1.35 9
Analytic_4_SOD_Credit_Adjustment 1.21 10 1.20 10
Analytic_5_Match_Shipping_to_SO 1.79 8 1.72 8
Analytic_6_Match_Invoice_to_Ship 2.33 4 2.22 5
Analytic_7_Missing_Sales_Orders 2.31 5 3.18 1
Analytic_8_Unauthorized_Shipments 2.27 6 2.17 6
Analytic_9_SOD_Ship_Invoice 1.88 7 1.81 7
Analytic_10_Orphaned_Invoices 2.85 3 2.70 4
Analytic_11_SOD_Invoice_Receipt 1.00 12 1.00 12
Analytic_12_Excessive_Write_Offs 3.11 1 2.94 2
Analytic
Special Case Model General Case Model
Weight Rank Weight Rank
Analytic_12_Excessive_Write_Offs 3.11 1 2.94 2
Analytic_2_Unauthorized_Sales_Order 2.86 2 2.71 3
Analytic_10_Orphaned_Invoices 2.85 3 2.7 4
Analytic_6_Match_Invoice_to_Ship 2.33 4 2.22 5
Analytic_7_Missing_Sales_Orders 2.31 5 3.18 1
Analytic_8_Unauthorized_Shipments 2.27 6 2.17 6
Analytic_9_SOD_Ship_Invoice 1.88 7 1.81 7
Analytic_5_Match_Shipping_to_SO 1.79 8 1.72 8
Analytic_3_Unathorized_Price 1.38 9 1.35 9
Analytic_4_SOD_Credit_Adjustment 1.21 10 1.2 10
Analytic_1_SOD_Customers 1 11 1 11
Analytic_11_SOD_Invoice_Receipt 1 12 1 12
Weights – Internal vs. External Auditors
185/31/201534th WCARS
All Responses Internal Auditors External Auditors
Analytic Weight Rank Weight Rank Weight Rank
Analytic_1_SOD_Customers 1.00 11 1.00 10 1.00 11
Analytic_2_Unauthorized_Sales_Order 2.71 3 2.65 4 2.84 3
Analytic_3_Unathorized_Price 1.35 9 1.51 8 1.24 9
Analytic_4_SOD_Credit_Adjustment 1.20 10 1.45 9 1.06 10
Analytic_5_Match_Shipping_to_SO 1.72 8 1.98 7 1.59 8
Analytic_6_Match_Invoice_to_Ship 2.22 5 2.29 6 2.22 5
Analytic_7_Missing_Sales_Orders 3.18 1 3.10 1 3.37 1
Analytic_8_Unauthorized_Shipments 2.17 6 2.36 5 2.08 6
Analytic_9_SOD_Ship_Invoice 1.81 7 1.00 11 1.79 7
Analytic_10_Orphaned_Invoices 2.70 4 2.75 3 2.76 4
Analytic_11_SOD_Invoice_Receipt 1.00 12 1.00 12 1.00 12
Analytic_12_Excessive_Write_Offs 2.94 2 2.93 2 3.05 2
Takeaway from today
I think the main take away from this presentation is:
A. Continuous auditing sucks, dude!
B. It is better to stick to traditional sample based auditing
C. Number of exceptions is always very low
D. Hussein is awesome!!! (Hint: correct answer)
195/31/201534th WCARS
Too many exceptions!
Information Overload
Research Opp. in EE
Exceptional Exceptions - 12th CONTECSI 34th WCARS
Exceptional Exceptions - 12th CONTECSI 34th WCARS

More Related Content

Viewers also liked

Tighe & Bond - 2016 EHS Breakfast - Holyoke Event
Tighe & Bond - 2016 EHS Breakfast - Holyoke EventTighe & Bond - 2016 EHS Breakfast - Holyoke Event
Tighe & Bond - 2016 EHS Breakfast - Holyoke Event
Wayne Bates
 
Survival Guide for
Survival Guide forSurvival Guide for
Survival Guide forlbbchmm49
 
Building a Climate Resilient Business: Managing Risks & Exploit Opportunities...
Building a Climate Resilient Business: Managing Risks & Exploit Opportunities...Building a Climate Resilient Business: Managing Risks & Exploit Opportunities...
Building a Climate Resilient Business: Managing Risks & Exploit Opportunities...
Enhesa
 
Bn1031 demo sap ehs
Bn1031 demo sap ehsBn1031 demo sap ehs
Bn1031 demo sap ehs
conline training
 
PSCI 1 Presentation environmental and safety regulatory overview by Maharshi ...
PSCI 1 Presentation environmental and safety regulatory overview by Maharshi ...PSCI 1 Presentation environmental and safety regulatory overview by Maharshi ...
PSCI 1 Presentation environmental and safety regulatory overview by Maharshi ...
Kartik Vora
 
The State of the EHS Industry
The State of the EHS Industry The State of the EHS Industry
The State of the EHS Industry
Triumvirate Environmental
 
Pharma forum 2016 EHS audits lessons learnt by Prashanth K
Pharma forum 2016 EHS audits lessons learnt by Prashanth KPharma forum 2016 EHS audits lessons learnt by Prashanth K
Pharma forum 2016 EHS audits lessons learnt by Prashanth K
Kartik Vora
 
OSHA Top Ten - 2016 NEWEA Annual Conference
OSHA Top Ten -  2016 NEWEA Annual ConferenceOSHA Top Ten -  2016 NEWEA Annual Conference
OSHA Top Ten - 2016 NEWEA Annual Conference
David Horowitz
 
Successful EHS Auditing Insights from a Client's Perspective
Successful EHS Auditing Insights from a Client's PerspectiveSuccessful EHS Auditing Insights from a Client's Perspective
Successful EHS Auditing Insights from a Client's Perspective
Antea Group
 
EHS Audit Overview
EHS Audit OverviewEHS Audit Overview
EHS Audit Overview
James Charles
 
Enhesa webinar 世界の環境安全衛生規制取締り動向
Enhesa webinar 世界の環境安全衛生規制取締り動向 Enhesa webinar 世界の環境安全衛生規制取締り動向
Enhesa webinar 世界の環境安全衛生規制取締り動向
Enhesa
 
ASSE Safety 2016: Ed Sattar Speaks about Operational Risk and Regulatory Chan...
ASSE Safety 2016: Ed Sattar Speaks about Operational Risk and Regulatory Chan...ASSE Safety 2016: Ed Sattar Speaks about Operational Risk and Regulatory Chan...
ASSE Safety 2016: Ed Sattar Speaks about Operational Risk and Regulatory Chan...
Ed Sattar
 

Viewers also liked (13)

Tighe & Bond - 2016 EHS Breakfast - Holyoke Event
Tighe & Bond - 2016 EHS Breakfast - Holyoke EventTighe & Bond - 2016 EHS Breakfast - Holyoke Event
Tighe & Bond - 2016 EHS Breakfast - Holyoke Event
 
Survival Guide for
Survival Guide forSurvival Guide for
Survival Guide for
 
Building a Climate Resilient Business: Managing Risks & Exploit Opportunities...
Building a Climate Resilient Business: Managing Risks & Exploit Opportunities...Building a Climate Resilient Business: Managing Risks & Exploit Opportunities...
Building a Climate Resilient Business: Managing Risks & Exploit Opportunities...
 
Bn1031 demo sap ehs
Bn1031 demo sap ehsBn1031 demo sap ehs
Bn1031 demo sap ehs
 
PSCI 1 Presentation environmental and safety regulatory overview by Maharshi ...
PSCI 1 Presentation environmental and safety regulatory overview by Maharshi ...PSCI 1 Presentation environmental and safety regulatory overview by Maharshi ...
PSCI 1 Presentation environmental and safety regulatory overview by Maharshi ...
 
The State of the EHS Industry
The State of the EHS Industry The State of the EHS Industry
The State of the EHS Industry
 
Pharma forum 2016 EHS audits lessons learnt by Prashanth K
Pharma forum 2016 EHS audits lessons learnt by Prashanth KPharma forum 2016 EHS audits lessons learnt by Prashanth K
Pharma forum 2016 EHS audits lessons learnt by Prashanth K
 
OSHA Top Ten - 2016 NEWEA Annual Conference
OSHA Top Ten -  2016 NEWEA Annual ConferenceOSHA Top Ten -  2016 NEWEA Annual Conference
OSHA Top Ten - 2016 NEWEA Annual Conference
 
Successful EHS Auditing Insights from a Client's Perspective
Successful EHS Auditing Insights from a Client's PerspectiveSuccessful EHS Auditing Insights from a Client's Perspective
Successful EHS Auditing Insights from a Client's Perspective
 
EHS Audit Overview
EHS Audit OverviewEHS Audit Overview
EHS Audit Overview
 
Enhesa webinar 世界の環境安全衛生規制取締り動向
Enhesa webinar 世界の環境安全衛生規制取締り動向 Enhesa webinar 世界の環境安全衛生規制取締り動向
Enhesa webinar 世界の環境安全衛生規制取締り動向
 
ASSE Safety 2016: Ed Sattar Speaks about Operational Risk and Regulatory Chan...
ASSE Safety 2016: Ed Sattar Speaks about Operational Risk and Regulatory Chan...ASSE Safety 2016: Ed Sattar Speaks about Operational Risk and Regulatory Chan...
ASSE Safety 2016: Ed Sattar Speaks about Operational Risk and Regulatory Chan...
 
Llaville
LlavilleLlaville
Llaville
 

Similar to Exceptional Exceptions - 12th CONTECSI 34th WCARS

My business processes are deviant! What should I do about it?
My business processes are deviant! What should I do about it?My business processes are deviant! What should I do about it?
My business processes are deviant! What should I do about it?
Marlon Dumas
 
Value-added it auditing
Value-added it auditingValue-added it auditing
Value-added it auditing
Marc Vael
 
2018 ValAct - Session 22 - Material Weakness
2018 ValAct - Session 22 - Material Weakness2018 ValAct - Session 22 - Material Weakness
2018 ValAct - Session 22 - Material Weakness
MarkSpong1
 
2018 Val Act: Session 22 - Material weakness
2018 Val Act: Session 22 - Material weakness2018 Val Act: Session 22 - Material weakness
2018 Val Act: Session 22 - Material weakness
Alex Hovi
 
Audit ratings guide
Audit ratings guideAudit ratings guide
Audit ratings guide
CenapSerdarolu
 
Structured NERC CIP Process Improvement Using Six Sigma
Structured NERC CIP Process Improvement Using Six SigmaStructured NERC CIP Process Improvement Using Six Sigma
Structured NERC CIP Process Improvement Using Six Sigma
EnergySec
 
Comprehensive Compliance for Environmental, Safety, Quality Requirements in C...
Comprehensive Compliance for Environmental, Safety, Quality Requirements in C...Comprehensive Compliance for Environmental, Safety, Quality Requirements in C...
Comprehensive Compliance for Environmental, Safety, Quality Requirements in C...
Nimonik
 
Internal audit ratings guide
Internal audit ratings guideInternal audit ratings guide
Internal audit ratings guide
CenapSerdarolu
 
Audit: Breaking Down Barriers to Increase the Use of Data Analytics
Audit: Breaking Down Barriers to Increase the Use of Data AnalyticsAudit: Breaking Down Barriers to Increase the Use of Data Analytics
Audit: Breaking Down Barriers to Increase the Use of Data Analytics
CaseWare IDEA
 
6_Kimberly Todd - QA and QC.pptx
6_Kimberly Todd - QA and QC.pptx6_Kimberly Todd - QA and QC.pptx
6_Kimberly Todd - QA and QC.pptx
JoiGirish1
 
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015 Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015
CA CISA Jayjit Biswas
 
Acams lv presentation attivio
Acams lv presentation attivioAcams lv presentation attivio
Acams lv presentation attivio
Jane Zupan
 
Achieving Compliance Efficiencies Amid Heightened Regulatory Scruntiny
Achieving Compliance Efficiencies Amid Heightened Regulatory Scruntiny Achieving Compliance Efficiencies Amid Heightened Regulatory Scruntiny
Achieving Compliance Efficiencies Amid Heightened Regulatory Scruntiny
Erin Lally
 
Achieving Compliance Efficiencies Amid Heightened Regulatory Scruntiny
Achieving Compliance Efficiencies Amid Heightened Regulatory Scruntiny Achieving Compliance Efficiencies Amid Heightened Regulatory Scruntiny
Achieving Compliance Efficiencies Amid Heightened Regulatory Scruntiny
Erin Lally
 
Achieving Compliance Efficiencies Amid Heightened Regulatory Scrutiny
Achieving Compliance Efficiencies Amid Heightened Regulatory ScrutinyAchieving Compliance Efficiencies Amid Heightened Regulatory Scrutiny
Achieving Compliance Efficiencies Amid Heightened Regulatory Scrutiny
Attivio
 
Process Mining and Predictive Process Monitoring
Process Mining and Predictive Process MonitoringProcess Mining and Predictive Process Monitoring
Process Mining and Predictive Process Monitoring
Marlon Dumas
 
10. Project Quality Management
10. Project Quality Management 10. Project Quality Management
10. Project Quality Management
BhuWan Khadka
 
ISA 3 COBIT
ISA 3 COBITISA 3 COBIT
ISA 3 COBIT
Darshan Kumar
 
The Benefits of Applying Lean Sigma for Service
The Benefits of Applying Lean Sigma for ServiceThe Benefits of Applying Lean Sigma for Service
The Benefits of Applying Lean Sigma for Service
Willie Carter
 
Enhancing Service Quality: Implementing Lean Sigma
Enhancing Service Quality: Implementing Lean SigmaEnhancing Service Quality: Implementing Lean Sigma
Enhancing Service Quality: Implementing Lean Sigma
Willie Carter
 

Similar to Exceptional Exceptions - 12th CONTECSI 34th WCARS (20)

My business processes are deviant! What should I do about it?
My business processes are deviant! What should I do about it?My business processes are deviant! What should I do about it?
My business processes are deviant! What should I do about it?
 
Value-added it auditing
Value-added it auditingValue-added it auditing
Value-added it auditing
 
2018 ValAct - Session 22 - Material Weakness
2018 ValAct - Session 22 - Material Weakness2018 ValAct - Session 22 - Material Weakness
2018 ValAct - Session 22 - Material Weakness
 
2018 Val Act: Session 22 - Material weakness
2018 Val Act: Session 22 - Material weakness2018 Val Act: Session 22 - Material weakness
2018 Val Act: Session 22 - Material weakness
 
Audit ratings guide
Audit ratings guideAudit ratings guide
Audit ratings guide
 
Structured NERC CIP Process Improvement Using Six Sigma
Structured NERC CIP Process Improvement Using Six SigmaStructured NERC CIP Process Improvement Using Six Sigma
Structured NERC CIP Process Improvement Using Six Sigma
 
Comprehensive Compliance for Environmental, Safety, Quality Requirements in C...
Comprehensive Compliance for Environmental, Safety, Quality Requirements in C...Comprehensive Compliance for Environmental, Safety, Quality Requirements in C...
Comprehensive Compliance for Environmental, Safety, Quality Requirements in C...
 
Internal audit ratings guide
Internal audit ratings guideInternal audit ratings guide
Internal audit ratings guide
 
Audit: Breaking Down Barriers to Increase the Use of Data Analytics
Audit: Breaking Down Barriers to Increase the Use of Data AnalyticsAudit: Breaking Down Barriers to Increase the Use of Data Analytics
Audit: Breaking Down Barriers to Increase the Use of Data Analytics
 
6_Kimberly Todd - QA and QC.pptx
6_Kimberly Todd - QA and QC.pptx6_Kimberly Todd - QA and QC.pptx
6_Kimberly Todd - QA and QC.pptx
 
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015 Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015
 
Acams lv presentation attivio
Acams lv presentation attivioAcams lv presentation attivio
Acams lv presentation attivio
 
Achieving Compliance Efficiencies Amid Heightened Regulatory Scruntiny
Achieving Compliance Efficiencies Amid Heightened Regulatory Scruntiny Achieving Compliance Efficiencies Amid Heightened Regulatory Scruntiny
Achieving Compliance Efficiencies Amid Heightened Regulatory Scruntiny
 
Achieving Compliance Efficiencies Amid Heightened Regulatory Scruntiny
Achieving Compliance Efficiencies Amid Heightened Regulatory Scruntiny Achieving Compliance Efficiencies Amid Heightened Regulatory Scruntiny
Achieving Compliance Efficiencies Amid Heightened Regulatory Scruntiny
 
Achieving Compliance Efficiencies Amid Heightened Regulatory Scrutiny
Achieving Compliance Efficiencies Amid Heightened Regulatory ScrutinyAchieving Compliance Efficiencies Amid Heightened Regulatory Scrutiny
Achieving Compliance Efficiencies Amid Heightened Regulatory Scrutiny
 
Process Mining and Predictive Process Monitoring
Process Mining and Predictive Process MonitoringProcess Mining and Predictive Process Monitoring
Process Mining and Predictive Process Monitoring
 
10. Project Quality Management
10. Project Quality Management 10. Project Quality Management
10. Project Quality Management
 
ISA 3 COBIT
ISA 3 COBITISA 3 COBIT
ISA 3 COBIT
 
The Benefits of Applying Lean Sigma for Service
The Benefits of Applying Lean Sigma for ServiceThe Benefits of Applying Lean Sigma for Service
The Benefits of Applying Lean Sigma for Service
 
Enhancing Service Quality: Implementing Lean Sigma
Enhancing Service Quality: Implementing Lean SigmaEnhancing Service Quality: Implementing Lean Sigma
Enhancing Service Quality: Implementing Lean Sigma
 

More from TECSI FEA USP

12th CONTECSI USP - Guia para publicar Andre Jun Emerald
12th CONTECSI USP - Guia para publicar  Andre Jun Emerald12th CONTECSI USP - Guia para publicar  Andre Jun Emerald
12th CONTECSI USP - Guia para publicar Andre Jun Emerald
TECSI FEA USP
 
12 contecsi IT Management GAESI USP Rastreabilidade de Medicamentos - Elcio...
12 contecsi  IT Management GAESI USP  Rastreabilidade de Medicamentos - Elcio...12 contecsi  IT Management GAESI USP  Rastreabilidade de Medicamentos - Elcio...
12 contecsi IT Management GAESI USP Rastreabilidade de Medicamentos - Elcio...
TECSI FEA USP
 
12 contecsi Workshop Mendeley Ligia Capobianco
12 contecsi   Workshop Mendeley Ligia Capobianco12 contecsi   Workshop Mendeley Ligia Capobianco
12 contecsi Workshop Mendeley Ligia Capobianco
TECSI FEA USP
 
Planejamento e gestão de indicadores para projetos digitais - Workshop 12th C...
Planejamento e gestão de indicadores para projetos digitais - Workshop 12th C...Planejamento e gestão de indicadores para projetos digitais - Workshop 12th C...
Planejamento e gestão de indicadores para projetos digitais - Workshop 12th C...
TECSI FEA USP
 
Programa de Apoio às Publicações Científicas Periódicas da USP - 12th CONTECSI
Programa de Apoio às Publicações Científicas Periódicas da USP - 12th CONTECSI Programa de Apoio às Publicações Científicas Periódicas da USP - 12th CONTECSI
Programa de Apoio às Publicações Científicas Periódicas da USP - 12th CONTECSI
TECSI FEA USP
 
Centro Integrado de Mobilidade Urbana CIMU - 12th CONTECSI
 Centro Integrado de Mobilidade Urbana CIMU - 12th CONTECSI   Centro Integrado de Mobilidade Urbana CIMU - 12th CONTECSI
Centro Integrado de Mobilidade Urbana CIMU - 12th CONTECSI
TECSI FEA USP
 
The ladder of Citizens ‘smartness’ Citizens participation in smart cities - 1...
The ladder of Citizens ‘smartness’ Citizens participation in smart cities - 1...The ladder of Citizens ‘smartness’ Citizens participation in smart cities - 1...
The ladder of Citizens ‘smartness’ Citizens participation in smart cities - 1...
TECSI FEA USP
 
Papel de los vocabularios semánticos en la economía en red - 12th CONTECSI
 Papel de los vocabularios semánticos en la economía en red - 12th CONTECSI  Papel de los vocabularios semánticos en la economía en red - 12th CONTECSI
Papel de los vocabularios semánticos en la economía en red - 12th CONTECSI
TECSI FEA USP
 
Balance Innovations in Backoffice Improvement and Service Delivery A study ca...
Balance Innovations in Backoffice Improvement and Service Delivery A study ca...Balance Innovations in Backoffice Improvement and Service Delivery A study ca...
Balance Innovations in Backoffice Improvement and Service Delivery A study ca...
TECSI FEA USP
 
Automated Clustering Project - 12th CONTECSI 34th WCARS
Automated Clustering Project - 12th CONTECSI 34th WCARS Automated Clustering Project - 12th CONTECSI 34th WCARS
Automated Clustering Project - 12th CONTECSI 34th WCARS
TECSI FEA USP
 
Sistema Autenticador e Transmissor (SAT): modelo tecnológico de automação e c...
Sistema Autenticador e Transmissor (SAT): modelo tecnológico de automação e c...Sistema Autenticador e Transmissor (SAT): modelo tecnológico de automação e c...
Sistema Autenticador e Transmissor (SAT): modelo tecnológico de automação e c...
TECSI FEA USP
 
GAESI - Gestão em Automação e TI - 12th CONTECSI
GAESI - Gestão em Automação e TI - 12th CONTECSI GAESI - Gestão em Automação e TI - 12th CONTECSI
GAESI - Gestão em Automação e TI - 12th CONTECSI
TECSI FEA USP
 
Co-production: an opportunity toward better digital governance - 12th CONTECSI
 Co-production: an opportunity toward better digital governance - 12th CONTECSI  Co-production: an opportunity toward better digital governance - 12th CONTECSI
Co-production: an opportunity toward better digital governance - 12th CONTECSI
TECSI FEA USP
 
The Digital Transformation - Challenges and Opportunities for IS researchers ...
The Digital Transformation - Challenges and Opportunities for IS researchers ...The Digital Transformation - Challenges and Opportunities for IS researchers ...
The Digital Transformation - Challenges and Opportunities for IS researchers ...
TECSI FEA USP
 
Auditoria Contínua e o Sistema de Controle da Administração Pública Federal -...
Auditoria Contínua e o Sistema de Controle da Administração Pública Federal -...Auditoria Contínua e o Sistema de Controle da Administração Pública Federal -...
Auditoria Contínua e o Sistema de Controle da Administração Pública Federal -...
TECSI FEA USP
 
Big (huge) Data and a continuous and predictive audit: new evidence, new met...
 Big (huge) Data and a continuous and predictive audit: new evidence, new met... Big (huge) Data and a continuous and predictive audit: new evidence, new met...
Big (huge) Data and a continuous and predictive audit: new evidence, new met...
TECSI FEA USP
 
Text Mining and Continuous Assurance Kevin Moffitt - 12th CONTECSI 34th WCARS
Text Mining and Continuous Assurance Kevin Moffitt - 12th CONTECSI 34th WCARSText Mining and Continuous Assurance Kevin Moffitt - 12th CONTECSI 34th WCARS
Text Mining and Continuous Assurance Kevin Moffitt - 12th CONTECSI 34th WCARS
TECSI FEA USP
 
Federal Audit in Relation to Continuous Audit - 12th CONTECSI 34th WCARS
 Federal Audit in Relation to Continuous Audit - 12th CONTECSI 34th WCARS Federal Audit in Relation to Continuous Audit - 12th CONTECSI 34th WCARS
Federal Audit in Relation to Continuous Audit - 12th CONTECSI 34th WCARS
TECSI FEA USP
 
O Tribunal de Contas da União e a Auditoria Contínua - 12th CONTECSI 34th WCARS
O Tribunal de Contas da União e a Auditoria Contínua - 12th CONTECSI 34th WCARSO Tribunal de Contas da União e a Auditoria Contínua - 12th CONTECSI 34th WCARS
O Tribunal de Contas da União e a Auditoria Contínua - 12th CONTECSI 34th WCARS
TECSI FEA USP
 
Cenário atual da Auditoria Contínua em Bancos no Brasil Itaú-Unibanco Holding...
Cenário atual da Auditoria Contínua em Bancos no Brasil Itaú-Unibanco Holding...Cenário atual da Auditoria Contínua em Bancos no Brasil Itaú-Unibanco Holding...
Cenário atual da Auditoria Contínua em Bancos no Brasil Itaú-Unibanco Holding...
TECSI FEA USP
 

More from TECSI FEA USP (20)

12th CONTECSI USP - Guia para publicar Andre Jun Emerald
12th CONTECSI USP - Guia para publicar  Andre Jun Emerald12th CONTECSI USP - Guia para publicar  Andre Jun Emerald
12th CONTECSI USP - Guia para publicar Andre Jun Emerald
 
12 contecsi IT Management GAESI USP Rastreabilidade de Medicamentos - Elcio...
12 contecsi  IT Management GAESI USP  Rastreabilidade de Medicamentos - Elcio...12 contecsi  IT Management GAESI USP  Rastreabilidade de Medicamentos - Elcio...
12 contecsi IT Management GAESI USP Rastreabilidade de Medicamentos - Elcio...
 
12 contecsi Workshop Mendeley Ligia Capobianco
12 contecsi   Workshop Mendeley Ligia Capobianco12 contecsi   Workshop Mendeley Ligia Capobianco
12 contecsi Workshop Mendeley Ligia Capobianco
 
Planejamento e gestão de indicadores para projetos digitais - Workshop 12th C...
Planejamento e gestão de indicadores para projetos digitais - Workshop 12th C...Planejamento e gestão de indicadores para projetos digitais - Workshop 12th C...
Planejamento e gestão de indicadores para projetos digitais - Workshop 12th C...
 
Programa de Apoio às Publicações Científicas Periódicas da USP - 12th CONTECSI
Programa de Apoio às Publicações Científicas Periódicas da USP - 12th CONTECSI Programa de Apoio às Publicações Científicas Periódicas da USP - 12th CONTECSI
Programa de Apoio às Publicações Científicas Periódicas da USP - 12th CONTECSI
 
Centro Integrado de Mobilidade Urbana CIMU - 12th CONTECSI
 Centro Integrado de Mobilidade Urbana CIMU - 12th CONTECSI   Centro Integrado de Mobilidade Urbana CIMU - 12th CONTECSI
Centro Integrado de Mobilidade Urbana CIMU - 12th CONTECSI
 
The ladder of Citizens ‘smartness’ Citizens participation in smart cities - 1...
The ladder of Citizens ‘smartness’ Citizens participation in smart cities - 1...The ladder of Citizens ‘smartness’ Citizens participation in smart cities - 1...
The ladder of Citizens ‘smartness’ Citizens participation in smart cities - 1...
 
Papel de los vocabularios semánticos en la economía en red - 12th CONTECSI
 Papel de los vocabularios semánticos en la economía en red - 12th CONTECSI  Papel de los vocabularios semánticos en la economía en red - 12th CONTECSI
Papel de los vocabularios semánticos en la economía en red - 12th CONTECSI
 
Balance Innovations in Backoffice Improvement and Service Delivery A study ca...
Balance Innovations in Backoffice Improvement and Service Delivery A study ca...Balance Innovations in Backoffice Improvement and Service Delivery A study ca...
Balance Innovations in Backoffice Improvement and Service Delivery A study ca...
 
Automated Clustering Project - 12th CONTECSI 34th WCARS
Automated Clustering Project - 12th CONTECSI 34th WCARS Automated Clustering Project - 12th CONTECSI 34th WCARS
Automated Clustering Project - 12th CONTECSI 34th WCARS
 
Sistema Autenticador e Transmissor (SAT): modelo tecnológico de automação e c...
Sistema Autenticador e Transmissor (SAT): modelo tecnológico de automação e c...Sistema Autenticador e Transmissor (SAT): modelo tecnológico de automação e c...
Sistema Autenticador e Transmissor (SAT): modelo tecnológico de automação e c...
 
GAESI - Gestão em Automação e TI - 12th CONTECSI
GAESI - Gestão em Automação e TI - 12th CONTECSI GAESI - Gestão em Automação e TI - 12th CONTECSI
GAESI - Gestão em Automação e TI - 12th CONTECSI
 
Co-production: an opportunity toward better digital governance - 12th CONTECSI
 Co-production: an opportunity toward better digital governance - 12th CONTECSI  Co-production: an opportunity toward better digital governance - 12th CONTECSI
Co-production: an opportunity toward better digital governance - 12th CONTECSI
 
The Digital Transformation - Challenges and Opportunities for IS researchers ...
The Digital Transformation - Challenges and Opportunities for IS researchers ...The Digital Transformation - Challenges and Opportunities for IS researchers ...
The Digital Transformation - Challenges and Opportunities for IS researchers ...
 
Auditoria Contínua e o Sistema de Controle da Administração Pública Federal -...
Auditoria Contínua e o Sistema de Controle da Administração Pública Federal -...Auditoria Contínua e o Sistema de Controle da Administração Pública Federal -...
Auditoria Contínua e o Sistema de Controle da Administração Pública Federal -...
 
Big (huge) Data and a continuous and predictive audit: new evidence, new met...
 Big (huge) Data and a continuous and predictive audit: new evidence, new met... Big (huge) Data and a continuous and predictive audit: new evidence, new met...
Big (huge) Data and a continuous and predictive audit: new evidence, new met...
 
Text Mining and Continuous Assurance Kevin Moffitt - 12th CONTECSI 34th WCARS
Text Mining and Continuous Assurance Kevin Moffitt - 12th CONTECSI 34th WCARSText Mining and Continuous Assurance Kevin Moffitt - 12th CONTECSI 34th WCARS
Text Mining and Continuous Assurance Kevin Moffitt - 12th CONTECSI 34th WCARS
 
Federal Audit in Relation to Continuous Audit - 12th CONTECSI 34th WCARS
 Federal Audit in Relation to Continuous Audit - 12th CONTECSI 34th WCARS Federal Audit in Relation to Continuous Audit - 12th CONTECSI 34th WCARS
Federal Audit in Relation to Continuous Audit - 12th CONTECSI 34th WCARS
 
O Tribunal de Contas da União e a Auditoria Contínua - 12th CONTECSI 34th WCARS
O Tribunal de Contas da União e a Auditoria Contínua - 12th CONTECSI 34th WCARSO Tribunal de Contas da União e a Auditoria Contínua - 12th CONTECSI 34th WCARS
O Tribunal de Contas da União e a Auditoria Contínua - 12th CONTECSI 34th WCARS
 
Cenário atual da Auditoria Contínua em Bancos no Brasil Itaú-Unibanco Holding...
Cenário atual da Auditoria Contínua em Bancos no Brasil Itaú-Unibanco Holding...Cenário atual da Auditoria Contínua em Bancos no Brasil Itaú-Unibanco Holding...
Cenário atual da Auditoria Contínua em Bancos no Brasil Itaú-Unibanco Holding...
 

Recently uploaded

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 

Recently uploaded (20)

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 

Exceptional Exceptions - 12th CONTECSI 34th WCARS

  • 3. Background • Audit by Exception (Vasarhelyi and Halper, 1991) • Continuous Auditing literature is rich with studies that propose statistical and machine learning techniques to identify exceptions (Dull et al., 2006; Groomer & Murthy, 1989a; Alexander Kogan et al., 1999; Vasarhelyi & Halper, 1991) • Problem? • Result? 35/31/201534th WCARS Large numbers of Exceptions! -Information overload! -Ambiguity -Information relevance
  • 4. Motivation & Contribution Motivation: • Prior continuous auditing research focused on detecting exceptions efficiently • We need to develop a classification hierarchy or ranking of detected exceptions to limit the need for human intervention Contribution: • Fill the gap in the continuous auditing literature with regards to providing the human users with assistance in dealing with large number of exceptions • Propose exceptions prioritization methodologies 45/31/201534th WCARS
  • 5. Relevant Literature-Exceptional Exceptions • Analysis usually yields large amounts of exceptions, causing information overloads due to sub-optimal business processes or over-conservative CA/CM system (Alles et al 2006, 2008 ; Debreceny et al. 2003) • Human users perform complex aggregation and processing tasks poorly (Iselin, 1988; Kleinmunitz, 1990) • Murthy 2012 emphasized the lack of and need for studies addressing the problem of large numbers of exceptions 55/31/201534th WCARS
  • 6. IDENTIFYING AND PRIORITIZING IRREGULARITIES USING A RULE- BASED MODEL WITH A WEIGHTING SYSTEM DERIVED FROM EXPERTS’ KNOWLEDGE
  • 7. Motivation, Research Questions, & Findings Motivation: • Plenty of studies for exception identification, few address processing • Majority of expert systems assign the same weight to rules • HOWEVER: business rules, and accordingly their violations, do not have the same importance Research Questions: 1. How can we integrate the judgment of the domain experts (in this case the auditors) in a rule-based expert system? 2. How can we develop a weighting system for the various rules in that expert system? 3. How can we use this weighting system to prioritize exceptions? 75/31/201534th WCARS
  • 11. Rule-Based System • Set of IF-THEN rules • Popularity stems from simplicity, interpretability, flexibility • Data: Simulated Order to Cash data • Originally 33 analytics, narrowed down to 12 by experienced auditors • 12 analytics can be categorized as tests for: – Segregation of duties – Unauthorized transactions – Missing documents – Non-matching documents. 115/31/201534th WCARS
  • 12. Rules Weights Inference • Business rules and accordingly their violations, do not have the same significance • 28 participants with 3 and more years of experience: – Conduct 17 pairwise comparisons – Select the transaction they believe to present higher control risk – Provide justification if their assessment 125/31/201534th WCARS Customer Transaction ID Custom er ID Invoice Number Invoice Date Created by Inventory Item ID Invoice Selling Price Invoiced Amount Shipment ID Shipment document Created By Shipment document Approved By 10034 1146 10001203 10/15/1997 1546 63 800 9600 10000877 1002 1546 4110 1000 10000262 3/1/1998 1117 628 600 1800 SOD Missing Values (Orphaned invoices)
  • 13. Rules Weight Inference-LP • Special Case Linear Program – 16 pairs – Each transaction can violate one and only one • General Case Linear Program – 17 pairs – One transaction violated two rules 135/31/201534th WCARS
  • 14. Exceptions Identification & Prioritization Identification: • Apply expert system to the whole population to find all the records that violate one or more rules • Remaining records are assumed to be normal, thus presenting negligible risk Prioritization: • Calculate the Suspicion Score for each exception such that: 145/31/201534th WCARS
  • 16. Investigation & Feedback Investigation: • Auditors are provided with Prioritized exceptions • Scope of investigation depends on their time/budget constraints Feedback: • Helps adjusting the rules that make up the expert system. • Enables us to modify the weights of the rules according to the audit teams’ findings – incorporated as a new set of constraints in the general case Model • Effect of the original experiment will decrease over time with more feedback from auditors 165/31/201534th WCARS
  • 17. Weights –Special vs. General Models 175/31/201534th WCARS • Excessive Write offs ranked highest • SOD in general ranked low • Rules with direct impact on financial numbers ranked high • Operational controls ranked low Analytic Special Case Model General Case Model Weight Rank Weight Rank Analytic_1_SOD_Customers 1.00 11 1.00 11 Analytic_2_Unauthorized_Sales_Order 2.86 2 2.71 3 Analytic_3_Unathorized_Price 1.38 9 1.35 9 Analytic_4_SOD_Credit_Adjustment 1.21 10 1.20 10 Analytic_5_Match_Shipping_to_SO 1.79 8 1.72 8 Analytic_6_Match_Invoice_to_Ship 2.33 4 2.22 5 Analytic_7_Missing_Sales_Orders 2.31 5 3.18 1 Analytic_8_Unauthorized_Shipments 2.27 6 2.17 6 Analytic_9_SOD_Ship_Invoice 1.88 7 1.81 7 Analytic_10_Orphaned_Invoices 2.85 3 2.70 4 Analytic_11_SOD_Invoice_Receipt 1.00 12 1.00 12 Analytic_12_Excessive_Write_Offs 3.11 1 2.94 2 Analytic Special Case Model General Case Model Weight Rank Weight Rank Analytic_12_Excessive_Write_Offs 3.11 1 2.94 2 Analytic_2_Unauthorized_Sales_Order 2.86 2 2.71 3 Analytic_10_Orphaned_Invoices 2.85 3 2.7 4 Analytic_6_Match_Invoice_to_Ship 2.33 4 2.22 5 Analytic_7_Missing_Sales_Orders 2.31 5 3.18 1 Analytic_8_Unauthorized_Shipments 2.27 6 2.17 6 Analytic_9_SOD_Ship_Invoice 1.88 7 1.81 7 Analytic_5_Match_Shipping_to_SO 1.79 8 1.72 8 Analytic_3_Unathorized_Price 1.38 9 1.35 9 Analytic_4_SOD_Credit_Adjustment 1.21 10 1.2 10 Analytic_1_SOD_Customers 1 11 1 11 Analytic_11_SOD_Invoice_Receipt 1 12 1 12
  • 18. Weights – Internal vs. External Auditors 185/31/201534th WCARS All Responses Internal Auditors External Auditors Analytic Weight Rank Weight Rank Weight Rank Analytic_1_SOD_Customers 1.00 11 1.00 10 1.00 11 Analytic_2_Unauthorized_Sales_Order 2.71 3 2.65 4 2.84 3 Analytic_3_Unathorized_Price 1.35 9 1.51 8 1.24 9 Analytic_4_SOD_Credit_Adjustment 1.20 10 1.45 9 1.06 10 Analytic_5_Match_Shipping_to_SO 1.72 8 1.98 7 1.59 8 Analytic_6_Match_Invoice_to_Ship 2.22 5 2.29 6 2.22 5 Analytic_7_Missing_Sales_Orders 3.18 1 3.10 1 3.37 1 Analytic_8_Unauthorized_Shipments 2.17 6 2.36 5 2.08 6 Analytic_9_SOD_Ship_Invoice 1.81 7 1.00 11 1.79 7 Analytic_10_Orphaned_Invoices 2.70 4 2.75 3 2.76 4 Analytic_11_SOD_Invoice_Receipt 1.00 12 1.00 12 1.00 12 Analytic_12_Excessive_Write_Offs 2.94 2 2.93 2 3.05 2
  • 19. Takeaway from today I think the main take away from this presentation is: A. Continuous auditing sucks, dude! B. It is better to stick to traditional sample based auditing C. Number of exceptions is always very low D. Hussein is awesome!!! (Hint: correct answer) 195/31/201534th WCARS Too many exceptions! Information Overload Research Opp. in EE