Information fusion in continuous assurance

ABSTRACT : We extend continuous assurance research by proposing a novel continuous assurance architecture grounded in information fusion research. Existing continuous assurance architectures focus primarily on methods of monitoring assurance clients' systems to detect anomalous activities and have not addressed the question of how to process the detected anomalies. Consequently, actual implementations of these systems typically detect a large number of anomalies, with the resulting information overload leading to suboptimal decision making due to human information processing limitations. The proposed architecture addresses these issues by performing anomaly detection, aggregation, and evaluation. Within the proposed architecture, artifacts developed in prior continuous assurance, ontology, and artificial intelligence research are used to perform the detection, aggregation, and evaluation information fusion tasks. The architecture contributes to the academic continuous assurance literature and has implicat...

[1]  Belur V. Dasarathy,et al.  Sensor fusion potential exploitation-innovative architectures and illustrative applications , 1997, Proc. IEEE.

[2]  Rajiv Kishore,et al.  Semantics of the MibML Conceptual Modeling Grammar: An Ontological Analysis Using the Bunge-Wang-Weber Framework , 2007, J. Database Manag..

[3]  William E. McCarthy,et al.  An ontological analysis of the economic primitives of the extended-REA enterprise information architecture , 2002, Int. J. Account. Inf. Syst..

[4]  Ron Weber,et al.  Reflection: Ontology in Information Systems - Foreword , 2004, Journal of Database Management.

[5]  Ingoo Han,et al.  Fuzzy cognitive map for the design of EDI controls , 2000, Inf. Manag..

[6]  Roger Debreceny,et al.  The Development of Embedded Audit Modules to Support Continuous Monitoring in the Electronic Commerce Environment , 2003 .

[7]  M. Bedworth,et al.  The Omnibus model: a new model of data fusion? , 2000 .

[8]  B Kleinmuntz,et al.  Why we still use our heads instead of formulas: toward an integrative approach. , 1990, Psychological bulletin.

[9]  Miklos A. Vasarhelyi,et al.  Restoring auditor credibility: tertiary monitoring and logging of continuous assurance systems , 2004, Int. J. Account. Inf. Syst..

[10]  Thomas G. Calderon,et al.  A roadmap for future neural networks research in auditing and risk assessment , 2002, Int. J. Account. Inf. Syst..

[11]  Jiri Matas,et al.  On Combining Classifiers , 1998, IEEE Trans. Pattern Anal. Mach. Intell..

[12]  Uday S. Murthy A Continuous Auditing Web Services ( CAWS ) Model for XML Based Accounting Systems , 2003 .

[13]  Errol R. Iselin The effects of information load and information diversity on decision quality in a structured decision task , 1988 .

[14]  A. Tversky,et al.  Judgment under Uncertainty: Heuristics and Biases , 1974, Science.

[15]  Jon B. Woodroof,et al.  Continuous audit: Model development and implementation within a debt covenant compliance domain , 2001, Int. J. Account. Inf. Syst..

[16]  Ching Y. Suen,et al.  Multiple Classifier Combination Methodologies for Different Output Levels , 2000, Multiple Classifier Systems.

[17]  Steve G. Sutton,et al.  Learning from WorldCom: Implications for Fraud Detection through Continuous Assurance , 2006 .

[18]  Miklos A. Vasarhelyi,et al.  Putting Continuous Auditing Theory into Practice: Lessons from Two Pilot Implementations , 2008, J. Inf. Syst..

[19]  Ronald J. Daigle,et al.  System Controls Reliability and Assessment Effort , 2005 .

[20]  Martin Bichler,et al.  Design science in information systems research , 2006, Wirtschaftsinf..

[21]  Miklos A. Vasarhelyi,et al.  Continuous Online Auditing: A Program of Research , 1999, J. Inf. Syst..

[22]  Cheryl L. Dunn,et al.  An Investigation of Localization as an Element of Cognitive Fit in Accounting Model Representations , 2001, Decis. Sci..

[23]  William E. McCarthy,et al.  Augmented Intensional Reasoning in Knowledge-Based Accounting Systems , 2000, J. Inf. Syst..

[24]  Uday S. Murthy,et al.  A continuous auditing web services model for XML-based accounting systems , 2004, Int. J. Account. Inf. Syst..

[25]  Miklos A. Vasarhelyi,et al.  Principles of Analytic Monitoring for Continuous Assurance , 2004 .

[26]  Salvatore J. Stolfo,et al.  Adaptive Intrusion Detection: A Data Mining Approach , 2000, Artificial Intelligence Review.

[27]  Lionel Valet,et al.  A statistical overview of recent literature in information fusion , 2001 .

[28]  Mark J. Nigrini,et al.  Using Key Performance Indicators and Risk Measures in Continuous Monitoring , 2008 .

[29]  Barbro Back,et al.  Artificial Neural Network Assistant (ANNA) for Continuous Auditing and Monitoring of Financial Data , 2007 .

[30]  M. Vasarhelyi THE CONTINUOUS AUDIT OF ONLINE SYSTEMS , 1991 .

[31]  Franklin E White,et al.  Data Fusion Lexicon , 1991 .

[32]  Thomas R. Gruber,et al.  A translation approach to portable ontology specifications , 1993 .

[33]  Richard B. Dull,et al.  ACTVE: A Proposal for an Automated Continuous Transaction Verification Environment , 2006 .

[34]  Miklos A. Vasarhelyi,et al.  Continuous monitoring of business process controls: A pilot implementation of a continuous auditing system at Siemens , 2006, Int. J. Account. Inf. Syst..

[35]  Rajiv Kishore,et al.  Enterprise integration using the agent paradigm: foundations of multi-agent-based integrative business information systems , 2006, Decis. Support Syst..

[36]  Alan R. Hevner,et al.  Design Science in Information Systems Research , 2004, MIS Q..

[37]  Rick Elam,et al.  Continuous Auditing: Building Automated Auditing Capability , 2002 .