Information Fusion in Continuous Assurance Johan Perols University of San Diego Uday Murthy University of South Florida UWCISA Symposium October 2, 2009.

Slides:



Advertisements
Similar presentations
The 20th International Conference on Software Engineering and Knowledge Engineering (SEKE2008) Department of Electrical and Computer Engineering
Advertisements

Data mining in wireless sensor networks based on artificial neural-networks algorithms Authors: Andrea Kulakov and Danco Davcev Presentation by: Niyati.
Overview of IS Controls, Auditing, and Security Fall 2005.
Kenneth G. Dixon School of Accounting LEARNING FROM WORLDCOM: IMPLICATIONS FOR FRAUD DETECTION THROUGH CONTINUOUS ASSURANCE J. Randel Kuhn, Jr. University.
Modeling Human Reasoning About Meta-Information Presented By: Scott Langevin Jingsong Wang.
1. Research Topics for Continuous Auditing Mike Groomer Professor of Accounting and Information Systems Kelley School of Business Indiana University.
Funding Networks Abdullah Sevincer University of Nevada, Reno Department of Computer Science & Engineering.
CHAPTER 10 & 13 IS within the Organization & Acquiring IS and Applications.
Information Fusion for Wireless Sensor Networks: Methods, Models, and Classifications 姓 名 : 尤淑孟 學 號 : 指導教授 : 溫志煜.
Information and Decision Support Systems
1 Chapter 4 Decision Support and Artificial Intelligence Brainpower for Your Business.
Evolution of the Siemens Experience in its Effort to Test IT Controls on a Continuous Basis Rolf Haardörfer IT Audit Professional Siemens Corporation Tenth.
1 MACHINE LEARNING TECHNIQUES IN IMAGE PROCESSING By Kaan Tariman M.S. in Computer Science CSCI 8810 Course Project.
Learning Programs Danielle and Joseph Bennett (and Lorelei) 4 December 2007.
Database Basics Overview of Databases. Arrivederci Pacioli Five primary weaknesses of traditional accounting system (debits and credits): Focus on subset.
McGraw-Hill/Irwin ©2005 The McGraw-Hill Companies, All rights reserved ©2005 The McGraw-Hill Companies, All rights reserved McGraw-Hill/Irwin.
Cross Strait Quad-Regional Radio Science and Wireless Technology Conference, Vol. 2, p.p. 980 – 984, July 2011 Cross Strait Quad-Regional Radio Science.
Software Architecture premaster course 1.  Israa Mosatafa Islam  Neveen Adel Mohamed  Omnia Ibrahim Ahmed  Dr Hany Ammar 2.
H-1 Network Management Network management is the process of controlling a complex data network to maximize its efficiency and productivity The overall.
Architectural Design.
System Analysis Overview Document functional requirements by creating models Two concepts help identify functional requirements in the traditional approach.
Data Mining Chun-Hung Chou
1 BTEC HNC Systems Support Castle College 2007/8 Systems Analysis Lecture 9 Introduction to Design.
0AI-based Information Technology  Information Technology Based on AI ● What is Artificial Intelligence? ● Artificial Intelligence vs. Natural Intelligence.
Introduction to SDLC: System Development Life Cycle Dr. Dania Bilal IS 582 Spring 2009.
Tufts Wireless Laboratory School Of Engineering Tufts University “Network QoS Management in Cyber-Physical Systems” Nicole Ng 9/16/20151 by Feng Xia, Longhua.
Leslie Luyt Supervisor: Dr. Karen Bradshaw 2 November 2009.
Chapter 1 - Introduction to Accounting Information Systems
SDLC: System Development Life Cycle Dr. Dania Bilal IS 582 Spring 2007.
Chapter 1 An Introduction to Assurance and Financial Statement Auditing Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or.
UOS 1 Ontology Based Personalized Search Zhang Tao The University of Seoul.
Testing Workflow In the Unified Process and Agile/Scrum processes.
Havva Alizadeh Ferdowsi University of Mashhad, WTLab Spring
Introduction Complex and large SW. SW crises Expensive HW. Custom SW. Batch execution Structured programming Product SW.
Chapter 3 DECISION SUPPORT SYSTEMS CONCEPTS, METHODOLOGIES, AND TECHNOLOGIES: AN OVERVIEW Study sub-sections: , 3.12(p )
Secure Sensor Data/Information Management and Mining Bhavani Thuraisingham The University of Texas at Dallas October 2005.
1 Devon M. Simmonds University of North Carolina, Wilmington CSC450 Software Engineering WorkFlow Modeling with Activity Diagrams.
Mapping Internet Sensors with Probe Response Attacks Authors: John Bethencourt, Jason Franklin, Mary Vernon Published At: Usenix Security Symposium, 2005.
Project funded by the Future and Emerging Technologies arm of the IST Programme FET-Open scheme Project funded by the Future and Emerging Technologies.
Research Streams in Continuous Audit: A review and Analysis of the Existing Literature Carol Brown Jeff Wong Amelia Baldwin.
Project Database Handler The Project Database Handler is a brokering application that mediates interactions between the project database and the external.
Lecture 11 Introduction to Information Systems Lecture 12 Objectives  Describe an information system and explain its components  Describe the characteristics.
1 Accounting systems design & evaluation Karen Lau 25 Feb 2002.
Artificial Intelligence, Expert Systems, and Neural Networks Group 10 Cameron Kinard Leaundre Zeno Heath Carley Megan Wiedmaier.
AUDIT SOFTWARE Chapter 16. Generalized Audit Software Off-the-shelf software that provides a means to gain access to and manipulate data maintained on.
Automatic Video Editing Stanislav Sumec. Motivation  Multiple source video data – several cameras in the meeting room, several meeting rooms in teleconference,
John D. McGregor Architecture Evaluation
MIS.
Identifying “Best Bet” Web Search Results by Mining Past User Behavior Author: Eugene Agichtein, Zijian Zheng (Microsoft Research) Source: KDD2006 Reporter:
Chapter : 9 Architectural Design
Instructor : Dr. Powsiri Klinkhachorn
1 Overview of PCAOB Auditing Standard No. 5 An Audit of Internal Control Over Financial Reporting that is Integrated with an Audit of Financial Statements.
System A system is a set of elements and relationships which are different from relationships of the set or its elements to other elements or sets.
Chapter 8-1 Chapter 8 Accounting Information Systems Information Technology Auditing Dr. Hisham madi.
IEEE AI - BASED POWER SYSTEM TRANSIENT SECURITY ASSESSMENT Dr. Hossam Talaat Dept. of Electrical Power & Machines Faculty of Engineering - Ain Shams.
The article written by Boyarshinova Vera Scientific adviser: Eltyshev Denis THE USE OF NEURO-FUZZY MODELS FOR INTEGRATED ASSESSMENT OF THE CONDITIONS OF.
Learning Bayesian Networks for Complex Relational Data
Presented by: Saurav Kumar Bengani
ANOMALY DETECTION FRAMEWORK FOR BIG DATA
Chapter 1 An Introduction to Assurance and Financial Statement Auditing.
SDLC: System Development Life Cycle
WP4 Measurements & social indicators.
We teach ATM Networks to Think
Chapter 5 Designing the Architecture Shari L. Pfleeger Joanne M. Atlee
Assoc. Prof. Dr. Syed Abdul-Rahman Al-Haddad
MACHINE LEARNING TECHNIQUES IN IMAGE PROCESSING
MACHINE LEARNING TECHNIQUES IN IMAGE PROCESSING
John H.L. Hansen & Taufiq Al Babba Hasan
Self-Managed Systems: an Architectural Challenge
Intelligent Process Automation in Audit
Presentation transcript:

Information Fusion in Continuous Assurance Johan Perols University of San Diego Uday Murthy University of South Florida UWCISA Symposium October 2,

Introduction and Motivation Drivers for continuous assurance (CA) have been in place for some time  A number of CA implementations have been described in prior research (Groomer & Murthy 1989; Vasarhelyi & Halper 1991; Alles et al. 2006)  Technology vendors providing CA functionality (SAP, ACL) Existing continuous assurance architectures focus on the detection of exceptions and do not address the important problem of processing detected exceptions. 2

Introduction and Motivation CA systems can lead to information overload, with a large number of detected exceptions Dealing with detected exceptions requires aggregating, processing, and analyzing exceptions Behavioral research in psychology and auditing has shown that humans are not good at these tasks 3

Research Objective We introduce Continuous Assurance Fusion (CAF): an architecture for CA that uses the concept of information fusion for aggregation and analysis of detected exceptions. CAF is grounded in prior CA literature and computer science information fusion research. 4

Information Fusion Information fusion involves gathering data about an object of interest from multiple sources and integrating these data in order to arrive at a holistic conclusion about the object. Application fields: defense, geoscience, robotics, medicine, and industrial engineering Goals of information fusion—  Dimensionality reduction  Improving precision / reducing uncertainty  Improving robustness when some data are noisy 5

CAF Overview The data gathering component of the architecture draws from prior CA research REA ontology concepts are used in the first data integration step Artificial intelligence and machine learning algorithms are used in the subsequent integration and evaluation steps 6

Background: Exception Detection Detection of exceptions can be data-oriented or control- oriented Two architectures have been proposed to accomplish the exception detection task  Embedded audit modules (EAM)  Monitoring and control layer (MCL) 7

Embedded Audit Modules Embedded audit modules (EAM) Examine transactions and controls for exceptions in real-time Relatively intrusive as detection code is implemented at the application or database level Offers better detection capabilities, but consumes more resources, so EAMs are better suited for control- oriented exception detection, in real-time Control over EAM resides with transaction processing system owners 8

Monitoring and Control Layer Monitoring and control layer (MCL) Examines transactions and controls for exceptions on a periodic basis Implemented as a stand-alone system that periodically queries transaction and control data Better suited for large-volume data-oriented exception detection, since it does not affect operational TPS Control over EAM resides with EAM owners: auditors 9

Alarm Overload Both data exceptions and control exceptions can result in alarm overload Dealing with alarm overload  Manually turning off groups of controls to minimize the degree of exception flooding (Alles et al. 2006)  Adjust CA monitoring parameters such that fewer alarms are generated 10

Continuous Assurance Fusion (CAF) CAF provides a method for aggregating and analyzing detected exceptions to draw audit-relevant conclusions Basic idea: It is possible to get a more complete and accurate assessment of objects and situations if data from many sensors are combined and multiple models are used to evaluate these data. 11

CAF Architecture Accounting Information System Aggregation Layer Monitoring Layer External Data Business Process Evaluation Layer Internal Data Information Users Figure 1 - CAF Conceptualization CAF CAF Data Decision Layer DAI-DAO DAI-FEO FEI-FEO FEI-DEO DEI-DEO 12

Layers in CAF Architecture Monitoring layer – same functionality as extant CA architectures Aggregation layer – generates object features by grouping exceptions based on their association to specific objects and computing additional object features Evaluation layer – invokes classifiers (e.g., logistic regression, ANN) on object features to make decisions about objects’ class membership Decision layer – combines the individual classifier object classifications into an overall CAF object class membership decision. 13

Aggregation Layer Data In  Feature Out fusion Use McCarthy’s REA ontology as the basis for aggregation layer processing  Automatically discerning features of exceptions Processing done is primarily grouping of exceptions in terms of severity, from Level 1 to Level 5 14

REA Ontology 15

Purchasing subsystem REA model 16

Aggregation Layer Level 1: Exceptions that relate to changes affecting a single R, E, or A object. Level 2: Exceptions grouped in terms of event-resource relationships. Level 3: Exceptions grouped in terms of event-agent relationships. Level 4: Exceptions grouped in terms of event-event relationships. Level 5: Exceptions grouped in terms of resource-event- agent relationships. 17

Exceptions – Purchasing Scenario Level 1: Invalid date/time stamp on purchasing order (exception involving a single ‘E’). Level 2: Purchase order for an inventory item with excessive quantity on hand (exception involving ‘E’ – ‘R’ relationship). Level 3: High dollar value purchase order placed by low level purchasing agent (exception involving ‘E’ – ‘A’ relationship). Level 4: Purchase order placed without existing purchase requisition (exception involving ‘E’ – ‘E’ relationship). Level 5: P.O. placed by low level purchasing agent for high value item (exception involving ‘R’ – ‘E’ – ‘A’ relationship). 18

Evaluation Layer Feature In  Decision Out fusion Use artificial neural network (ANN) technology  Input = features from aggregation layer  Output = probabilistic decision regarding “state” of the subsystem Purchasing business process example  Based on Level 1 – Level 5 features input, is the purchasing subsystem “in control” or “out of control”? 19

Decision Layer Decision In  Decision Out fusion Could use Bayesian control concepts, ANN, or RBES  Input = decisions regarding the state of individual subsystems from evaluation layer  Output = probabilistic decision regarding “state” of the overall information system Level of analysis for Evaluation and Decision layers is a design choice – modules / subsystems / system 20

Future Work Development of a functioning CAF prototype following architecture presented in this paper Use of agent-based technologies for implementing CAF Empirically evaluate and compare the utility of different classification algorithms at the Evaluation Layer Use of information fusion concepts in areas such as fraud detection 21

Summary and Conclusion Using concepts from information fusion, CAF is an architecture for dealing with audit exceptions CAF is not a functioning system but an approach that represents a way forward in addressing the problem of dealing with detected exceptions Aggregation layer applies REA ontology concepts to group exceptions by severity Evaluation and decision layers apply ANN or Bayesian concepts to draw conclusions about the state of a subsystem or the system as a whole 22