SlideShare a Scribd company logo
1 of 101
Philip Elsas ComputationalAuditing.com  Vught, The Netherlands  October 5-6, 2010  Dutch Research School for  Information and Knowledge Systems (SIKS) 2010 Advanced Course on Smart Auditing Part I - Smart Auditing:  an auditor (historical) perspective  Part II - New risk control mechanisms
Introduction ,[object Object],[object Object],[object Object],- Principal, chief architect & inventor of Smart Audit Support  - Smart Audit Support: since 1994 key in Deloitte’s worldwide   audit practice. Currently integrated in ‘The Deloitte Audit’ - System blueprint in chapter 5 of …  - PhD in Mathematics & Computing Science on Financial Auditing  - In parallel to Smart Audit project, 30% part-time,  Vrije Universiteit - Directly after appearance awarded with the biennial   Alfred Coini Prize for the best publication in Auditing Offering software and consultancy services to innovate audit practices and audit software firms  The Dutch Tax Office used Computational Auditing in 2001-2003 as frame of reference to compare Big 4 planning and decision-support models & systems to investigate how to improve audit productivity (57 page report);  considers Smart Audit Support ‘leader of the pack’
Why is Auditing an interesting Domain for SIKS:  the Dutch Research School for Information and Knowledge Systems? And, why now? ,[object Object],Organizational Context ,[object Object],Information  & Knowledge Systems Internal  & External Auditing ,[object Object]
Agenda ,[object Object],[object Object]
What connects part I & II? Owner-ordered auditing: dominating and integrating with management-ordered auditing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Why, and how, the present financial crisis is driving owner-ordered auditing core concepts out of a local past and into a global future
 
Part I  Smart Auditing:  an auditor (historical) perspective
Abstract   Part I - Smart Auditing:  an auditor (historical) perspective   ,[object Object],[object Object],[object Object],[object Object]
Agenda   Part I - Smart Auditing:  an auditor (historical) perspective   ,[object Object],[object Object],[object Object],[object Object],[object Object]
Motivation   Why now? Relevancy Points made by Frank Partnoy: Roosevelt Institute, March, 2010 US$ 600,000 Billion derivatives isn’t visible  on balance sheets “ Abusive off-balance sheet accounting” “ Another F-word:  Fiction” Solution direction: “Make  information  available to  investors” diagnosis remediation
Motivation Why now? Relevancy Points made by Rick Bookstaber: U.S. House of Representatives,  Committee on Science and Technology, Subcommittee on Investigations and Oversight, Sept. 2009 Derivatives & markets:  leverage, crowding & linkages Oversight solution direction:  “Get the data” “ Shareholders  are [only] silent partners  within  the corporation” Auditor’s attention point:  reliability of the data “ I don’t think – I don’t mean to be cynical – but I don’t think that leadership within a financial firm can overcome the incentives that exist” Inside solution direction:   “Long-term incentives” “ Gaming the system”
Motivation   Why now? Relevancy   Prolonged “License to gaming the system”:   “Moral hazard is worse than ever” ,[object Object],“ Wall Street's role in Greek crisis should be no surprise”, Allan Sloan, with ref. by Tom Nierop in public debate on accountant.nl, 2010 “ Four Weeks that Shook the Financial World”,  Edward Harrison:  “Moral hazard is worse than ever”, tvo.org, 2009 Regulatory capture in the financial industry, Bob Hoogenboom & Jules Muis on accountant.nl, 2009-2010 Moral hazard in the audit profession: every crisis leads to more audit work, “Catch-22 accountancy”, Bob Hoogenboom, accountant.nl, 2010 Indeed, out of the no-strings-attached TARP ( T o  A void  R egulating  P oliticians) pot!
[object Object],[object Object],Motivation   Why now? Relevancy   Directing the “License to Gaming” This red flag was attached to Lehman’s toxic products, and not only Lehman’s, and was timely and publicly raised by American government and subsequently ignored by European financial oversight & most European financial institutions, see: “Hebben toezichthouders onmacht deels zelf veroorzaakt?” (Dutch only), with ref. to Rutger Schimmelpenninck, liquidator of the Lehman Brothers Treasury, leading to questions asked in Dutch parliament, accountant.nl, 2009 “ House of Cards”, Canadian Broadcasting Corporation (CBC), Fifth Estate, 2010, highlights US government’s knowledge built up in the 2002 law suits Compare “tone at the top” by appointments: résumés of Mark Carney & Nout Wellink  & compare bail-outs “ Subprime primer”
Today’s audit challenge No.1 International Federation of Accountants (IFAC),  “Financial Reporting Supply Chain” “ Shareholders should more actively pursue their  ownership  responsibilities” &  “Align managerial behavior with the interests of the owners”,  Jane Diplock, 2010 European Commission, “Corporate governance in financial institutions and  remuneration policies”, green paper, June 2010, § 3.5 “The role of shareholders” “ …  lead to the abstraction,  or even  disappearance,  of the concept of ownership normally associated with holding shares” & footnote 18  General questions 5 & 3:  “How to practically improve shareholder control of financial institutions,  if still realistic?”  & Necessary reinforcements for the external auditor Gaspar et al. “Shareholder Investment Horizon and the Market for Corporate Control” “ Shareholders have little to say in the USA” &  “ Push legislators for statutory  duty of care  to investors, and get over the Caparo ruling (UK)”,  David Webb, 2010
Today’s audit challenge No.2 International Federation of Accountants (IFAC),  “Financial Reporting Supply Chain” “ Moving forward, national accountancy organizations should be charged with inventorying, bottom up,  systemic disconnects  that are difficult to voice for individual audit firms fearful of offending clients, and synthesizing them in an anonymous fashion.”,  Jules Muis, 2010 See: “Preparing for an Audit Mandate to Contribute to Systemic Risk Anticipation”, ‘de Accountant’ & accountant.nl, 2009, with follow-up in 2010 Connecting ‘micro’ to ‘macro’ Rick Bookstaber’s  Congressional testimonies on: - Hedge Funds, 2009 - Derivatives, 2009  - Systemic Risk, 2008 & 2007 “ My concern is that they are making themselves irrelevant.” Steven Thomas about auditors, based on the E&Y - Lehman case, 2010 See Royal NIVRA project “Sharing Knowledge” (“Kennis Delen”), NIVRA.nl  with a requested comment on  the new financial legislation  for derivatives, June 2010
Today’s challenges ,[object Object],[object Object],[object Object],Douglas Carmichael, First and Founding Chief Auditor of the Public Company Accounting Oversight Board (PCAOB),  with reference to the Theory of Rational Expectations by Th. Limperg Jr. (1879-1961) in “The PCAOB and the Social Responsibility of the Independent Auditor”, 2004 Th. Limperg Jr.
 
[object Object],Addressing today’s challenge no.2 A newborn, powerful preventive measure is the Royal NIVRA’s ‘Sharing Knowledge’ project, with supportive technology.  The auditor is positioned to attest whether internal controls and incentives are in place to provide data of adequate  reliability. A  reliability emphasizing long-term ownership interests. Anything better to neutralize management’s exposure to moral hazard than the owner-ordered audit? Individual financial institutions might each be free of an internal systemic risk, while, as a collection, they may induce an external systemic risk. This occurs when a lot of institutions take a similar position, while the other side is not sufficiently covered. Loosely speaking: too many are on the same side of the ship, without them being able to see one another. The auditor is a pre-eminent party to make such accumulated systemic risk visible. It’s a party that is able to aggregate information into systemic risk indicators - or to certify the therefor required reporting channel - while taking professional care of confidentiality issues. See: ‘de Accountant’, April 2010
Agenda   Part I - Smart Auditing:  an auditor (historical) perspective   ,[object Object],[object Object],[object Object],[object Object],[object Object]
1840 - 1930: United Kingdom ,[object Object],[object Object],[object Object],[object Object],Based upon “Reflections on Auditing Theory”,  Hans Blokdijk et al., Limperg Institute, 1996
 
1840 - 1930: United States of America  (1/2) ,[object Object],[object Object],[object Object],[object Object],Based upon “Reflections on Auditing Theory”,  Hans Blokdijk et al., Limperg Institute, 1996
[object Object],[object Object],[object Object],[object Object],1840 - 1930: United States of America  (2/2) Based upon “Reflections on Auditing Theory”,  Hans Blokdijk et al., Limperg Institute, 1996
Who are owners? Who is management? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
1840 - 1930: The Netherlands  (1 of 3) ,[object Object],[object Object],[object Object],Based upon “Reflections on Auditing Theory”,  Hans Blokdijk et al., Limperg Institute, 1996
[object Object],[object Object],[object Object],[object Object],1840 - 1930: The Netherlands  (2 of 3) Based upon “Reflections on Auditing Theory”,  Hans Blokdijk et al., Limperg Institute, 1996 See:  challenge no. 1  slide 14 & 17
[object Object],[object Object],[object Object],1840 - 1930: The Netherlands  (3 of 3) Based upon “Reflections on Auditing Theory”,  Hans Blokdijk et al., Limperg Institute, 1996 The very fact that the owner-ordered audit encloses a substantiated focus on ‘society at large’, is key in recognizing the suitability of this tradition in preventing that society ends up being owner of last resort in company bail outs
1840 - 1930: Two Main Ways of Audit Owners Management Potential  Owners Management-ordered audit, to attract new investors: Money inflow for management: Money inflow for owners: Owner-ordered audit, to check management: to increase credibility that profits aren’t UNDERstated: that no revenues are missing& expenses  (e.g. bonuses)  aren’t too high to increase credibility that profits aren’t OVERstated: that stated profits are real, and not (partly) fake USA NETH&UK maximize equity long-term ROI
Owner-ordered audit: an example ,[object Object],The Ritz-Carlton Investing Company was established by Albert Keller, who bought and franchised the name in the United States.  In 1927 he built the first Ritz-Carlton hotel in Boston, Massachusetts
Agenda   Part I - Smart Auditing:  an auditor (historical) perspective   ,[object Object],[object Object],[object Object],[object Object],[object Object]
1930-1990: Branching scientific approaches Dutch evolutionary branch Anglo-American evolutionary branch practical- inductive theoretical- deductive Audit policies, methods and standards  follow from considering  a lot of performed audits; empirical Audit methods evolve from client’s business process, i.e. a normative model Originally only a mental process model; later, due to formalization, supported by  an executable process model 1840-1930 foundation management-ordered audit:  overstated profits 1840-1930 foundation   owner-ordered audit:  understated profits
1930 - 1990: Branching approaches ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Introduction Prof. J.H. Blokdijk RA ,[object Object],[object Object],[object Object],[object Object],[object Object]
Annual company accounts
Contribution by Prof. J.H. Blokdijk RA On the basis of the previous slide I may explain the Dutch approach to substantive auditing. Starting point is the completeness of revenue from sales: if sales appear to be recorded completely, the sum of receivables and cash receipts have also been recorded completely: double-entry bookkeeping! No understatements! But receivables and cash are subsequently audited for overstatements; if these appear not to have occurred, revenue from sales cannot have been overstated either. So debit balances are being audited for overstatements, and credit balances for understatements. The same goes for expenses and liabilities. The latter are audited for completeness, and expenses for overstatements. If no irregularities are found, expenses have also been completely accounted for, and liabilities do not contain non-existing debts. In practice, there are, of course, complexities and technicalities to deal with in this approach, but the principle just outlined is the basis. So there is no need to audit any item, whether in the balance sheet or in the income statement, both for under- and overstatements. This is highly efficient; it is my impression that this is not being fully recognized in the International Statements on Auditing.
Contribution by Prof. J.H. Blokdijk RA Dutch auditors have also given thought to something called ‘auditability’. For the audit of ‘assertions’ in the books the auditor should have ‘evidence’, especially for auditing for overstatements. An important source is: documents. But an invoice from a supplier is not sufficient  in itself: the supplier may have overstated the price and/or the amount of goods purportedly delivered. The invoice should be reviewed and authorized internally. Here is where ‘internal control’ comes in. Performance of internal controls in that stage should normally be evidenced in some form, by stamps, initials on a voucher, and the like. The control should be performed by the appropriate employee: the system should provide for an adequate segregation of duties. Evidence of performance should include the identity of the employee. But how conclusive is that evidence? International Standards on Auditing mention several inherent limitations of internal control, such as human error, circumvention of internal controls through collusion, and management override. In performing tests of control, can the auditor detect this? This would only be possible if the auditor were able to repeat performing the internal controls involved.
Contribution by Prof. J.H. Blokdijk RA The problem can be illustrated with the following example. It involves invoices for goods or services received. It does not yet deal with the circumstance that many internal controls in this stage are no longer evidenced in visible form, but are embedded in the automated systems. Regarding those invoices, the auditor can easily reproduce the computation of the final amount and of a sales tax amount included in it. Reproducing the internal control on the price invoiced is more difficult: it may be in agreement with a price list from the supplier that the auditor may consult, but employees in the purchasing department are paid by the employing entity to obtain a better price. The difference may partly or wholly end up in their own pockets by way of the infamous kick-backs. Only a thorough knowledge of that particular market would enable the auditor to uncover such a defalcation; as he/she cannot be expected to have such expertise on all the markets where his/her clients do business, he/she must rely on the system of internal control.
Contribution by Prof. J.H. Blokdijk RA Similar considerations apply to the receipt of goods and the performance of services. Some goods could be traced afterwards, though that may be highly impractical. Most office supplies, however, are simply used up, and as to services, it is virtually impossible to ascertain that the windows actually have been cleaned if the audit takes place three months after. For the most important aspects of those purchases, the auditor cannot do much more than look for evidence of the performance of internal control. So, there are internal controls that cannot be reproduced by the auditor. The issues raised by this circumstance have been explored extensively in Dutch auditing literature. The best English translation I have been able to find for this type of internal controls is: 'non-reproducible' internal controls (in Dutch: “onvervangbare interne controle”). Sometimes, investigative techniques designed to overcome the restrictions outlined above, do exist, but an independent auditor is not allowed to use them. An example is the situation in which an auditor has suspicions about a credit note purportedly granted by his/her client to another company audited by a partner of his/her own audit firm. The professional rule of confidentiality does not permit the former auditor to consult the latter on this document.
Contribution by Prof. J.H. Blokdijk RA ‘ Non-reproducible’ internal controls Even though there are internal controls that can be reproduced, such as those involving arithmetical operations,  the most important ones often cannot be reproduced.  The fundamental causes have been categorized as follows: (1) expertise: the auditor cannot possibly acquire sufficient expertise to form, entirely by himself, a conclusive opinion on all the technical and/or commercial events that are to be reflected in the financial statements (e.g., product yield rates, purchase prices); (2) presence: the auditor cannot possibly be continuously present on the client's premises in order to ensure the completeness of the recording of transactions and (relevant) events; apart from economic considerations, this is unacceptable in that it would jeopardize the client's and/or the auditor's independence; and (3) inadmissibility of investigative techniques: the independent auditor is not entitled to use certain techniques that are available to government auditors (such as informing other government auditors about other taxpayers), or that may be used by police authorities (such as wiretaps, search of private premises and the like).
Contribution by Prof. J.H. Blokdijk RA So what should auditors do about ‘the system of internal control’? Firstly, they should evaluate the design of the system. Especially important is the segregation of duties; e.g., no single person should be able to authorize payment of invoices, and  persons charged with the authorization of separate elements (quantity, quality, prices) of invoices should not have an interest in collusion with each other, or with suppliers or other parties outside the auditee. In order to better evaluate the design of the internal control system, dr. Elsas has developed a very promising automated technique, which he will be glad to further explain.
Owner-ordered audit  concepts & methods:   ‘Crown jewels’ ,[object Object],[object Object],[object Object],Unfortunately, hardly translated into English, except for Limperg’s theory, in the 1970’s. In the public domain only Blokdijk et al. ‘96, and Elsas ‘96.
Supercycle: top-level business process Schmalenbach (1929), Limperg (1926, 1930’s), Abr. Mey (1936), Burgert (1957), Starreveld (1962, 1980’s), Frielink (1980’s), Blokdijk (1975), Veenstra (1972, p.41) Buy Side Sell Side Inside  (cost price) Sell price Buy price A rectangle represents a state, a balance sheet item A circle represents a (trans)action,  an activity, a mutation to connected states ‘ Soll’ (To Be) & ‘Ist’ (As Is) modalities
[object Object],[object Object],[object Object],[object Object],[object Object],Supercycle-based Auditing Laws Starreveld et al. & Frielink et al.  “ De wet van het rationeel verband tussen opgeofferde en verkregen zaken” & “De wet van de samenhang tussen toestand en gebeuren”, the BETA formula Begin - End + Inflow - Outflow = 0,  Gross Margin = Sales price - Cost price, Replacement Cost Accounting Activity Based Costing                 Law 2.  Rational relation between states at time points &    mutation streams over the enclosed time period:          per state      except: Money > 0
Supercycle-based auditing, model-based auditing … Begin End Purchase price Sales price Buy transaction Money buffer Goodsbuffer Sell transaction What happened in between? What is the normative relation?
Supercycle-based auditing 10,000’s man years of conceptualization  and abstraction,  integrated with  proof in practice,  over decades Worldwide recognized high quality audit education:  3-years post-Master Integrating owner-ordered audit method & management-ordered audit method into two-way audit approach Traditional Dutch audit education literature, Frielink et al. Mathematical framework: system of linear equations, based on the BETA-formula World’s scientifically strongest audit approach, due to its mathematical foundation How the spanning reconciliation checks, based on spanning equations, relate to the supercycle Superbly suited for powerful  computational support
 
Accounting Organization / Internal Control (AO/IC) ,[object Object],[object Object],p.37
Accounting Organization / Internal Control (AO/IC) ,[object Object],pp.37-39
Accounting Organization / Internal Control (AO/IC) ,[object Object],[object Object],pp.38-42 Internal control measures are refined into: (i) preventive protection of enterprise values (ii) preventive  securing of actions of agents (iii) creation of opportunities for detective and corrective  check & control activities ‘ Securing actions of agents’ is refined by restricting authorizations to different agents for: (i) actions directly changing values: intern, inflow & outflow (ii) actions involving no direct change of values
Audit-technical segregation of duties ,[object Object],[object Object],[object Object],[object Object],pp.43-46 ,[object Object],[object Object],[object Object],[object Object],Potential risk: management overriding of internal control & mitigation methods from the owner-ordered audit tradition The authorization restrictions to secure actions of agents involving no direct change of value, is refined into segregation of duties (SoD): audit-technical SoD & other SoD Leading to powerful conceptualization: in particular securing of actions of agents,  and ownership-oriented segregation of duties, thus including managerial duties from a critical point of view (!), therefore key in the irreplaceable and indispensable internal control  See: challenge no. 1  slide 14 & 17 The owner-ordered audit tradition substantiates  the concept of internal control from the perspective of  the owners’ original and authentic long-term interests
Supercycle & AO/IC The owner-ordered tradition introduces the concept of a quasi-goods stream for bonus rights – integrated within the regular stream of goods and services (see diagram) –  allowing for an integral assessment of the authorization and incentive structure,  as key component of the irreplaceable and indispensable internal control Here we’re in a smart auditing course, which may raise the question “Is there dumb auditing?”  See: challenge no. 1, slide 14 & 17
Accounting Organization / Internal Control (AO/IC) 1.  Control measures vs. check & control activities 2.  Preventive, detective & corrective 5.  Irreplaceable vs. replaceable; indispensable 4.  First-time recording vs. using existing recordings 6.  Preventive securing of actions of agents vs. values; check point 7.  Direct change of value vs. no direct change of value; outside 8.  Segregation of duties; audit-technical vs. business-economical pp.38-43 3.  Design, implementation & operation
Owner-ordered audit: an example ,[object Object],Haarlem beer barrel race, 2009, event sponsored by beer breweries
Agenda   Part I - Smart Auditing:  an auditor (historical) perspective   ,[object Object],[object Object],[object Object],[object Object],[object Object]
Computational formalization, with fully continued, proven & improved software base ,[object Object],[object Object],[object Object],[object Object],[object Object]
 
Smart Audit Support’s document index related to Deloitte’s International Audit Approach (1990’s) p.336 p.62 Example audit pack ,[object Object],[object Object],[object Object],Yearly  ROI  guess : 20K  man-yrs/yr  x $10K  cost reduction/man-yr =  $200M Deloitte’s approach All planning docs  are smart forms All planning docs  are smart forms All planning docs  are smart forms All planning docs  are smart forms All planning docs  are smart forms All planning docs are smart forms with built-in Conditional Relevancy
Process-based Cost Price: connector for  stream of money and stream of goods & services volume cost price spanning supercycle Forecasted volume vs. realized volume Planning & Control The cost price captures the quantitative relation between resource use & produced products Relating the stream of goods and the stream of money, answering “What’s the gross margin per  product type?”, as required for auditing the completeness assertion
Agenda   Part I - Smart Auditing:  an auditor (historical) perspective   ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],Match-making between ‘pull’ & ‘push’ Internationalize the owner-ordered audit method.  This requires deep computational support. Why? To minimize international, educational burden (3-years post-Master)  To streamline train-the-trainer, roll-out & getting ROI fast  ,[object Object],[object Object],[object Object],Push side ,[object Object],Addressing today’s challenge
Part II  New risk control mechanisms
What connects part I & II? Owner-ordered auditing: dominating and integrating with management-ordered auditing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Why, and how, the present financial crisis is driving owner-ordered auditing core concepts out of a local past and into a global future
Abstract   Part II - New risk control mechanisms   ,[object Object],[object Object],[object Object],[object Object]
Agenda   Part II - New risk control mechanisms   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Supercycle: interface between organization & auditor http://www.ComputationalAuditing.com/images/Kring.swf 1. Purchase 2. Accept 3. Sales 4. Deliver & Collect 5. Pay 6. Collect Process Steps
Soll: To Be, normative Ist: As Is, representative Soll & Ist modalities
Agenda   Part II - New risk control mechanisms   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
 
Qualitative: Cake cutting Mathematics, game theory How to use segregation of duties to let a group take care of getting an equal size of the cake for each member? Indeed, one cutter and the others are choosers: 1. Cutter cuts 2. Choosers choose 3. Cutter chooses  If we look closer, it’s not only about duties, but also about sequence & parallelism of duty involvement. Switch steps 2 & 3 and it won’t work anymore.  Protocol design & verification? Hint: use opposite interests to enforce fairness
 
 
Qualitative Audit Analytics - SoD X-Raying Segregation of Duties:  Support to Illuminate an Enterprise’s Immunity to Solo-Fraud Paper with two discussion articles, one by K. Matcham and one by R.S. Sriram,  and with a response article, appeared as four separate articles together in  the International Journal of Accounting Information Systems, June 2008 Quote from the response article: “Adequate SoD assessment and  SoD design appears to be much more complex than could have been assumed without this methodical analysis” with thanks to P.M. Ott de Vries  for discussing this quoted response Introduces an algebraic analysis technique that takes a supercycle-based body of authorizations as input, and delivers a  complete  linear basis that spans a space of singleton ‘black hole’  weak spots in the supercycle system of internal control, extensible from 1-agent, to 2-agent, etc. The concept of irreplaceable and indispensable internal control,  especially segregation of duties and securing actions of agents,  as developed in the owner-ordered audit tradition, allows a rationally rigorous analysis method, impossible with the segregation of duties concept from the management-ordered audit tradition Method answering the question if a body of authorizations is free of  opportunities for traceless embezzlement, without need to collude Alternatively stated: Method locating who has too many authorizations in one hand creating a dangerous opportunity for  traceless  embezzlement, jeopardizing the integrity of financial statements See:  challenge no. 1  slide 14 & 17
Agenda   Part II - New risk control mechanisms   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Quantitative: Completeness by  Spanning Reconciliation Checks 7)   (A/R) B  +  Sales  +  TS  – (A/R) E      C/R 6)   COGS  +  Gross Profit      Sales 3)   (Inv) B  +  P  – (Inv) E      COGS 2)   C/D  – (A/P) B  +  (A/P) E   – TP     P 1)   (Cash) B  +  C/R   – TO – (Cash) E      C/D 8)   (VAT) B  +  TS  – TP – TO     (VAT) E ,[object Object],[object Object],[object Object],pp.244-265 Integrating owner-ordered audit method   (quantities in boldface font on understatement  & quantities in  regular font on overstatement)  & management-ordered audit method   (just the reverse audit direction)  into two-way audit approach
Owner-ordered audit: an example ,[object Object]
Agenda   Part II - New risk control mechanisms   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Jacquard project:  Next Generation Auditing: Data Assurance as a Service ,[object Object],[object Object],[object Object],http://www.cwi.nl/en/2010/1064/Software-engineering-researchers-and-audit-experts ,[object Object],[object Object],[object Object],[object Object]
Jacquard: key audit phases 1.  Ist supercycle mining    Extend process mining to focus on client’s top-level    business process 2.  Soll supercycle identification    Identify Soll supercycle in Ist smart flowchart 3.  Continuous auditing   Confront a stream of business events to Soll,    close-to-real-time 4.  Collect, collate & aggregate deviations automatically 5.  Publish deviation top-10 on interactive supercycle    dashboard.  Interface to query the enterprise.   iPhone app Next   Generation Auditing: Data Assurance as a Service
Jacquard: project goals 1.  Design and implementation of DSL for representing    supercycle business models 2.  Querying of models: Pacioli DSL 3.  Visualization of models Next   Generation Auditing: Data Assurance as a Service 4.  Parsing, extraction & analysis of business data  5.  Interpretation & inclusion of business data in model 6.  DSL for structured auditing interviews via interactive audit documentation (expert vs. engagement team)  7.  Facilitating automatic generation of XBRL &  XBRL Formula (Standard Business Reporting, SBR): XBRL for data, DSL for analysis
Phase 1: Ist supercycle mining   Input : event log with journals, e.g. SAP Output : smart flowchart Based on: “Towards a Computer-Assisted Audit Analysis of Business Processes: Process Mining as Tool  for IT Auditors”, Maria Bezverhaya, Emiel Caron & Piet Goeyenbier,  ‘de EDP-Auditor’, NOREA, 2009 Push  signal from Technical University of Eindhoven, ProM, Fluxicon & Anne Rozinat Pull  signal from audit practitioners &  IT audit educators, e.g. “Process Mining”  by Mieke Jans & CARLAB, Rutgers, 2010 Computational Auditing:  - focus on discovery of  supercycle   - framing stand-alone workflows - connecting to cost price theory:    - activity-based costing   - process-based costing    - supercycle-based costing
 
Phase 2: Identify Soll in Ist Identify Soll supercycle by excluding Ist flows,  based on automatically identified candidate Ist flows Based on: “Towards a Computer-Assisted Audit Analysis of Business Processes: Process Mining as Tool  for IT Auditors”, Maria Bezverhaya,  Emiel Caron & Piet Goeyenbier,  ‘de EDP-Auditor’, NOREA, 2009 Push  signal from Technical University of Eindhoven, ProM, Fluxicon & Anne Rozinat Apply constraints to check if remaining model is a valid Soll Analyzing 3232 cases, classi-fying casualties (red arrows): A . Invoice receipt without   prior approval (2537x) B . Approval acquired after pur-   chase completion (261x) C . Purchase order established   for rejected request (9x) D . Handled order status skip-   ping receipt (875x), etc. Design-time workflow vs. run-time workflow Pull  signal from audit practitioners &  IT audit educators, e.g. “Process Mining”  by Mieke Jans & CARLAB, Rutgers, 2010 D A C B
Scientific foundation: rationally rigorous. With mathematical & computational formalization. Superbly suited for the digital age. Recognized as such in accelerating pace. Easy by new tech Top-cycle: normative backbone of the ‘business process’-oriented audit approach  Top-cycle concept & typology:  Central result of integral evolution.  Of ‘business process’-oriented Auditing  Theory , Auditing  Practice  & Auditing  Education . Over 60-80 years Typology of top-cycles: ordered by the strength of the backbone Unfortunately hardly translated into English Phase 2: Identify Soll supercycle in Ist Soll identification is supported by a typology of top-cycles
Phase 3: Continuous auditing  http://www.ComputationalAuditing.com/images/Kring.swf Confront a stream of business events to Soll Interrelate all buffer contents Reconcile with external evidence On-the-fly, close-to-real-time checking of spanning business equations Especially spanning buy side & sell side Triangulation Capture deviations and associated risks 3rd party evidence processing “ Continuity Equations”  Miklos Vasarhelyi  et al. CARLAB, Rutgers, 2010
 
 
Phase 4: Aggregate deviations  Based on: Sun, Srivastava & Mock, 2006  “An Informa-tion Systems Security Risk Assessment Model”, pp. 43-48   Fully Automatic Semi Automatic This can be realized in Deloitte’s Smart Audit Support with a plug-in for Dempster-Shafer-Srivastava confidence-level computations Manual Player
2  Receivables 3  Inventories + = ,[object Object],[object Object],[object Object],Plug-in: transferable ‘type polymorphism’ mechanism for XBRL Assurance Builder & Player Domain-Specific Language (DSL) for auditing: Pacioli, developed by Dutch software partner  in cooperation with national research center  for mathematics and computer science in the Netherlands (CWI) & University of Amsterdam 5 Assets 5 Current Assets At least one non-current inventory All three inventories are current { XBRL US GAAP Taxonomy or Articulate XBRL Assurance functionality using a dedicated website builder (plug-ins) instead of handcrafting XBRL Formula’s Type Polymorphism: Least Upper Bound in the Taxonomy Phase 4: Aggregate deviations  See: “On Positioning XBRL Assurance Business Rules in a Computational Infrastructure for Modern Auditing”, 2009, University of Kansas, Annual International Conference on XBRL
Phase 5: Publish deviation top-10 Publish on interactive dashboard Supercycle as dashboard Drill-down  on analytics Planning & Control Key Performance Indicators (KPI’s) Key Control Indicators (KCI’s) C b f t F m d D s t A t L f t P t P t W t A t A t S A A L F L F L F M M D F D  C B F B F W P P P P W A A A A C m D f t S t A t F t B f t B f t P t W t L f 225 25 200 225 500 25 25 1,000 400 400 100 20 20 20 20 500 400
Jacquard project:  Next Generation Auditing: Data Assurance as a Service demo by Jacques de Swart, PricewaterhouseCoopers  & Paul Griffioen, CWI  More on the Jacquard project at the  21st World Continuous Auditing & Reporting Symposium,  Rutgers, New Jersey, November 5-6, 2010
Agenda   Part II - New risk control mechanisms   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Nexus micro-macro: sustainability  ,[object Object]
Nexus micro-macro: Web infrastructure  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Why not have a public digital infrastructure for financial utility functions? With additional commercial functions? Computer Assisted Audit Tools & Techniques à la Skype
Nexus micro-macro: SWOOPs  Facilitate launching of  S elf   W eb- O rganized  O wning  P arties ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],“ The South-Koreans didn’t understand the advanced American derivatives, so they didn’t bought them and weren’t hit by the crisis”,  portfolio manager at big Dutch institutional investor for big Dutch pension fund who made big losses, Safe magazine, summer 2010
Agenda   Part II - New risk control mechanisms   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],Match-making between ‘pull’ & ‘push’ Internationalize the owner-ordered audit method.  This requires deep computational support. Why? To minimize international, educational burden (3-years post-Master)  To streamline train-the-trainer, roll-out & getting ROI fast  ,[object Object],[object Object],[object Object],Push side ,[object Object],Golden opportunity for the Netherlands
 
[object Object]

More Related Content

What's hot

The dodd frank effect on information management
The dodd frank effect on information managementThe dodd frank effect on information management
The dodd frank effect on information managementExterro
 
Reconceptualising Global Finance and its Regulation [Updated]
Reconceptualising Global Finance and its Regulation [Updated]Reconceptualising Global Finance and its Regulation [Updated]
Reconceptualising Global Finance and its Regulation [Updated]Raul A. Lujan Anaya
 
IMF Report Tentang Digital Currency Bank Sentral
IMF Report Tentang Digital Currency Bank SentralIMF Report Tentang Digital Currency Bank Sentral
IMF Report Tentang Digital Currency Bank SentralRein Mahatma
 
FT Partners Research: Transaction Security - At the Nexus of E-Commerce, Paym...
FT Partners Research: Transaction Security - At the Nexus of E-Commerce, Paym...FT Partners Research: Transaction Security - At the Nexus of E-Commerce, Paym...
FT Partners Research: Transaction Security - At the Nexus of E-Commerce, Paym...FT Partners / Financial Technology Partners
 
SunGard 2010 Compliance Summit: Keynote speech
SunGard 2010 Compliance Summit: Keynote speechSunGard 2010 Compliance Summit: Keynote speech
SunGard 2010 Compliance Summit: Keynote speechguestf1dd184
 
Alternative Investments - How Asset Management Firms Frame Their Funds
Alternative Investments - How Asset Management Firms Frame Their FundsAlternative Investments - How Asset Management Firms Frame Their Funds
Alternative Investments - How Asset Management Firms Frame Their FundsCorporate Insight
 
Advisor portal emerging trends
Advisor portal emerging trendsAdvisor portal emerging trends
Advisor portal emerging trendsNIIT Technologies
 
Next Generation Algorithmic Trading Strategies Summit 2010
Next Generation Algorithmic Trading Strategies Summit 2010Next Generation Algorithmic Trading Strategies Summit 2010
Next Generation Algorithmic Trading Strategies Summit 2010Lisa Krow
 

What's hot (12)

The dodd frank effect on information management
The dodd frank effect on information managementThe dodd frank effect on information management
The dodd frank effect on information management
 
Reconceptualising Global Finance and its Regulation [Updated]
Reconceptualising Global Finance and its Regulation [Updated]Reconceptualising Global Finance and its Regulation [Updated]
Reconceptualising Global Finance and its Regulation [Updated]
 
FT Partners Research: Are the Robots Taking Over? The Emergence of Digital W...
FT Partners Research: Are the Robots Taking Over?  The Emergence of Digital W...FT Partners Research: Are the Robots Taking Over?  The Emergence of Digital W...
FT Partners Research: Are the Robots Taking Over? The Emergence of Digital W...
 
IMF Report Tentang Digital Currency Bank Sentral
IMF Report Tentang Digital Currency Bank SentralIMF Report Tentang Digital Currency Bank Sentral
IMF Report Tentang Digital Currency Bank Sentral
 
THE ROBOTS HAVE IT RIGHT
THE ROBOTS HAVE IT RIGHTTHE ROBOTS HAVE IT RIGHT
THE ROBOTS HAVE IT RIGHT
 
Forensic Accountants & Money Laundering
Forensic Accountants & Money LaunderingForensic Accountants & Money Laundering
Forensic Accountants & Money Laundering
 
FT Partners Research: Transaction Security - At the Nexus of E-Commerce, Paym...
FT Partners Research: Transaction Security - At the Nexus of E-Commerce, Paym...FT Partners Research: Transaction Security - At the Nexus of E-Commerce, Paym...
FT Partners Research: Transaction Security - At the Nexus of E-Commerce, Paym...
 
SunGard 2010 Compliance Summit: Keynote speech
SunGard 2010 Compliance Summit: Keynote speechSunGard 2010 Compliance Summit: Keynote speech
SunGard 2010 Compliance Summit: Keynote speech
 
Alternative Investments - How Asset Management Firms Frame Their Funds
Alternative Investments - How Asset Management Firms Frame Their FundsAlternative Investments - How Asset Management Firms Frame Their Funds
Alternative Investments - How Asset Management Firms Frame Their Funds
 
Advisor portal emerging trends
Advisor portal emerging trendsAdvisor portal emerging trends
Advisor portal emerging trends
 
Aug-Sep cover story
Aug-Sep cover storyAug-Sep cover story
Aug-Sep cover story
 
Next Generation Algorithmic Trading Strategies Summit 2010
Next Generation Algorithmic Trading Strategies Summit 2010Next Generation Algorithmic Trading Strategies Summit 2010
Next Generation Algorithmic Trading Strategies Summit 2010
 

Similar to SIKS Smart Auditing Elsas

Mind the Gaps: AML and Fraud Global Benchmark Survey
Mind the Gaps: AML and Fraud Global Benchmark Survey Mind the Gaps: AML and Fraud Global Benchmark Survey
Mind the Gaps: AML and Fraud Global Benchmark Survey Paul Hamilton
 
Armstrong Accountancy Essay
Armstrong Accountancy EssayArmstrong Accountancy Essay
Armstrong Accountancy EssayAmanda Brady
 
The_future_of_finance_Re_inventing_finan.pdf
The_future_of_finance_Re_inventing_finan.pdfThe_future_of_finance_Re_inventing_finan.pdf
The_future_of_finance_Re_inventing_finan.pdf- -
 
course outline.docPHONEI prefer to be contacted via ema.docx
course outline.docPHONEI prefer to be contacted via ema.docxcourse outline.docPHONEI prefer to be contacted via ema.docx
course outline.docPHONEI prefer to be contacted via ema.docxfaithxdunce63732
 
Drinking Age Essay Conclusion
Drinking Age Essay ConclusionDrinking Age Essay Conclusion
Drinking Age Essay ConclusionErin Byers
 
Essay On Qualities Of A Good Friend
Essay On Qualities Of A Good FriendEssay On Qualities Of A Good Friend
Essay On Qualities Of A Good FriendKaren Oliver
 
Fshore Banking Institutions
Fshore Banking InstitutionsFshore Banking Institutions
Fshore Banking InstitutionsChristina Santos
 
Digital Currency: Regulatory Perspective from IDFPR
Digital Currency: Regulatory Perspective from IDFPRDigital Currency: Regulatory Perspective from IDFPR
Digital Currency: Regulatory Perspective from IDFPRDigital Currency Group
 
Fintech overview for HEIG-VD lecture, December 2016
Fintech overview for HEIG-VD lecture, December 2016Fintech overview for HEIG-VD lecture, December 2016
Fintech overview for HEIG-VD lecture, December 2016Jérôme Vasamillet
 
Rcls agenda spex 29.5
Rcls agenda spex 29.5Rcls agenda spex 29.5
Rcls agenda spex 29.5Sean Buckley
 

Similar to SIKS Smart Auditing Elsas (10)

Mind the Gaps: AML and Fraud Global Benchmark Survey
Mind the Gaps: AML and Fraud Global Benchmark Survey Mind the Gaps: AML and Fraud Global Benchmark Survey
Mind the Gaps: AML and Fraud Global Benchmark Survey
 
Armstrong Accountancy Essay
Armstrong Accountancy EssayArmstrong Accountancy Essay
Armstrong Accountancy Essay
 
The_future_of_finance_Re_inventing_finan.pdf
The_future_of_finance_Re_inventing_finan.pdfThe_future_of_finance_Re_inventing_finan.pdf
The_future_of_finance_Re_inventing_finan.pdf
 
course outline.docPHONEI prefer to be contacted via ema.docx
course outline.docPHONEI prefer to be contacted via ema.docxcourse outline.docPHONEI prefer to be contacted via ema.docx
course outline.docPHONEI prefer to be contacted via ema.docx
 
Drinking Age Essay Conclusion
Drinking Age Essay ConclusionDrinking Age Essay Conclusion
Drinking Age Essay Conclusion
 
Essay On Qualities Of A Good Friend
Essay On Qualities Of A Good FriendEssay On Qualities Of A Good Friend
Essay On Qualities Of A Good Friend
 
Fshore Banking Institutions
Fshore Banking InstitutionsFshore Banking Institutions
Fshore Banking Institutions
 
Digital Currency: Regulatory Perspective from IDFPR
Digital Currency: Regulatory Perspective from IDFPRDigital Currency: Regulatory Perspective from IDFPR
Digital Currency: Regulatory Perspective from IDFPR
 
Fintech overview for HEIG-VD lecture, December 2016
Fintech overview for HEIG-VD lecture, December 2016Fintech overview for HEIG-VD lecture, December 2016
Fintech overview for HEIG-VD lecture, December 2016
 
Rcls agenda spex 29.5
Rcls agenda spex 29.5Rcls agenda spex 29.5
Rcls agenda spex 29.5
 

More from Philip Elsas

TUACC philip feb 2012
TUACC philip feb 2012TUACC philip feb 2012
TUACC philip feb 2012Philip Elsas
 
Kansas Elsas Klint 2011
Kansas Elsas Klint 2011Kansas Elsas Klint 2011
Kansas Elsas Klint 2011Philip Elsas
 
Kansas Elsas Top-Cycle
Kansas Elsas Top-CycleKansas Elsas Top-Cycle
Kansas Elsas Top-CyclePhilip Elsas
 

More from Philip Elsas (6)

Philip kuxbrl2013
Philip kuxbrl2013Philip kuxbrl2013
Philip kuxbrl2013
 
TUACC philip feb 2012
TUACC philip feb 2012TUACC philip feb 2012
TUACC philip feb 2012
 
Top Cycle Mining
Top Cycle MiningTop Cycle Mining
Top Cycle Mining
 
Kansas Elsas Klint 2011
Kansas Elsas Klint 2011Kansas Elsas Klint 2011
Kansas Elsas Klint 2011
 
Kansas Elsas Top-Cycle
Kansas Elsas Top-CycleKansas Elsas Top-Cycle
Kansas Elsas Top-Cycle
 
XBRL Kansas Elsas
XBRL Kansas ElsasXBRL Kansas Elsas
XBRL Kansas Elsas
 

Recently uploaded

Dividend Policy and Dividend Decision Theories.pptx
Dividend Policy and Dividend Decision Theories.pptxDividend Policy and Dividend Decision Theories.pptx
Dividend Policy and Dividend Decision Theories.pptxanshikagoel52
 
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779Delhi Call girls
 
The Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdfThe Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdfGale Pooley
 
Monthly Market Risk Update: April 2024 [SlideShare]
Monthly Market Risk Update: April 2024 [SlideShare]Monthly Market Risk Update: April 2024 [SlideShare]
Monthly Market Risk Update: April 2024 [SlideShare]Commonwealth
 
Log your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaignLog your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaignHenry Tapper
 
20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdfAdnet Communications
 
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdfFinTech Belgium
 
00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptxFinTech Belgium
 
Call Girls In Yusuf Sarai Women Seeking Men 9654467111
Call Girls In Yusuf Sarai Women Seeking Men 9654467111Call Girls In Yusuf Sarai Women Seeking Men 9654467111
Call Girls In Yusuf Sarai Women Seeking Men 9654467111Sapana Sha
 
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130Suhani Kapoor
 
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
call girls in Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in  Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in  Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Instant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School SpiritInstant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School Spiritegoetzinger
 
fca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdffca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdfHenry Tapper
 
20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdf20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdfAdnet Communications
 
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptxFinTech Belgium
 
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escortsranjana rawat
 

Recently uploaded (20)

Dividend Policy and Dividend Decision Theories.pptx
Dividend Policy and Dividend Decision Theories.pptxDividend Policy and Dividend Decision Theories.pptx
Dividend Policy and Dividend Decision Theories.pptx
 
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
 
The Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdfThe Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdf
 
Monthly Market Risk Update: April 2024 [SlideShare]
Monthly Market Risk Update: April 2024 [SlideShare]Monthly Market Risk Update: April 2024 [SlideShare]
Monthly Market Risk Update: April 2024 [SlideShare]
 
Log your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaignLog your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaign
 
20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf
 
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
 
00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx
 
Call Girls In Yusuf Sarai Women Seeking Men 9654467111
Call Girls In Yusuf Sarai Women Seeking Men 9654467111Call Girls In Yusuf Sarai Women Seeking Men 9654467111
Call Girls In Yusuf Sarai Women Seeking Men 9654467111
 
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
 
Commercial Bank Economic Capsule - April 2024
Commercial Bank Economic Capsule - April 2024Commercial Bank Economic Capsule - April 2024
Commercial Bank Economic Capsule - April 2024
 
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
call girls in Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in  Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in  Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...
 
Instant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School SpiritInstant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School Spirit
 
Veritas Interim Report 1 January–31 March 2024
Veritas Interim Report 1 January–31 March 2024Veritas Interim Report 1 January–31 March 2024
Veritas Interim Report 1 January–31 March 2024
 
fca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdffca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdf
 
20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdf20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdf
 
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
 
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
 

SIKS Smart Auditing Elsas

  • 1. Philip Elsas ComputationalAuditing.com Vught, The Netherlands October 5-6, 2010 Dutch Research School for Information and Knowledge Systems (SIKS) 2010 Advanced Course on Smart Auditing Part I - Smart Auditing: an auditor (historical) perspective Part II - New risk control mechanisms
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.  
  • 7. Part I Smart Auditing: an auditor (historical) perspective
  • 8.
  • 9.
  • 10. Motivation Why now? Relevancy Points made by Frank Partnoy: Roosevelt Institute, March, 2010 US$ 600,000 Billion derivatives isn’t visible on balance sheets “ Abusive off-balance sheet accounting” “ Another F-word: Fiction” Solution direction: “Make information available to investors” diagnosis remediation
  • 11. Motivation Why now? Relevancy Points made by Rick Bookstaber: U.S. House of Representatives, Committee on Science and Technology, Subcommittee on Investigations and Oversight, Sept. 2009 Derivatives & markets: leverage, crowding & linkages Oversight solution direction: “Get the data” “ Shareholders are [only] silent partners within the corporation” Auditor’s attention point: reliability of the data “ I don’t think – I don’t mean to be cynical – but I don’t think that leadership within a financial firm can overcome the incentives that exist” Inside solution direction: “Long-term incentives” “ Gaming the system”
  • 12.
  • 13.
  • 14. Today’s audit challenge No.1 International Federation of Accountants (IFAC), “Financial Reporting Supply Chain” “ Shareholders should more actively pursue their ownership responsibilities” & “Align managerial behavior with the interests of the owners”, Jane Diplock, 2010 European Commission, “Corporate governance in financial institutions and remuneration policies”, green paper, June 2010, § 3.5 “The role of shareholders” “ … lead to the abstraction, or even disappearance, of the concept of ownership normally associated with holding shares” & footnote 18 General questions 5 & 3: “How to practically improve shareholder control of financial institutions, if still realistic?” & Necessary reinforcements for the external auditor Gaspar et al. “Shareholder Investment Horizon and the Market for Corporate Control” “ Shareholders have little to say in the USA” & “ Push legislators for statutory duty of care to investors, and get over the Caparo ruling (UK)”, David Webb, 2010
  • 15. Today’s audit challenge No.2 International Federation of Accountants (IFAC), “Financial Reporting Supply Chain” “ Moving forward, national accountancy organizations should be charged with inventorying, bottom up, systemic disconnects that are difficult to voice for individual audit firms fearful of offending clients, and synthesizing them in an anonymous fashion.”, Jules Muis, 2010 See: “Preparing for an Audit Mandate to Contribute to Systemic Risk Anticipation”, ‘de Accountant’ & accountant.nl, 2009, with follow-up in 2010 Connecting ‘micro’ to ‘macro’ Rick Bookstaber’s Congressional testimonies on: - Hedge Funds, 2009 - Derivatives, 2009 - Systemic Risk, 2008 & 2007 “ My concern is that they are making themselves irrelevant.” Steven Thomas about auditors, based on the E&Y - Lehman case, 2010 See Royal NIVRA project “Sharing Knowledge” (“Kennis Delen”), NIVRA.nl with a requested comment on the new financial legislation for derivatives, June 2010
  • 16.
  • 17.  
  • 18.
  • 19.
  • 20.
  • 21.  
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28. 1840 - 1930: Two Main Ways of Audit Owners Management Potential Owners Management-ordered audit, to attract new investors: Money inflow for management: Money inflow for owners: Owner-ordered audit, to check management: to increase credibility that profits aren’t UNDERstated: that no revenues are missing& expenses (e.g. bonuses) aren’t too high to increase credibility that profits aren’t OVERstated: that stated profits are real, and not (partly) fake USA NETH&UK maximize equity long-term ROI
  • 29.
  • 30.
  • 31. 1930-1990: Branching scientific approaches Dutch evolutionary branch Anglo-American evolutionary branch practical- inductive theoretical- deductive Audit policies, methods and standards follow from considering a lot of performed audits; empirical Audit methods evolve from client’s business process, i.e. a normative model Originally only a mental process model; later, due to formalization, supported by an executable process model 1840-1930 foundation management-ordered audit: overstated profits 1840-1930 foundation owner-ordered audit: understated profits
  • 32.
  • 33.
  • 35. Contribution by Prof. J.H. Blokdijk RA On the basis of the previous slide I may explain the Dutch approach to substantive auditing. Starting point is the completeness of revenue from sales: if sales appear to be recorded completely, the sum of receivables and cash receipts have also been recorded completely: double-entry bookkeeping! No understatements! But receivables and cash are subsequently audited for overstatements; if these appear not to have occurred, revenue from sales cannot have been overstated either. So debit balances are being audited for overstatements, and credit balances for understatements. The same goes for expenses and liabilities. The latter are audited for completeness, and expenses for overstatements. If no irregularities are found, expenses have also been completely accounted for, and liabilities do not contain non-existing debts. In practice, there are, of course, complexities and technicalities to deal with in this approach, but the principle just outlined is the basis. So there is no need to audit any item, whether in the balance sheet or in the income statement, both for under- and overstatements. This is highly efficient; it is my impression that this is not being fully recognized in the International Statements on Auditing.
  • 36. Contribution by Prof. J.H. Blokdijk RA Dutch auditors have also given thought to something called ‘auditability’. For the audit of ‘assertions’ in the books the auditor should have ‘evidence’, especially for auditing for overstatements. An important source is: documents. But an invoice from a supplier is not sufficient in itself: the supplier may have overstated the price and/or the amount of goods purportedly delivered. The invoice should be reviewed and authorized internally. Here is where ‘internal control’ comes in. Performance of internal controls in that stage should normally be evidenced in some form, by stamps, initials on a voucher, and the like. The control should be performed by the appropriate employee: the system should provide for an adequate segregation of duties. Evidence of performance should include the identity of the employee. But how conclusive is that evidence? International Standards on Auditing mention several inherent limitations of internal control, such as human error, circumvention of internal controls through collusion, and management override. In performing tests of control, can the auditor detect this? This would only be possible if the auditor were able to repeat performing the internal controls involved.
  • 37. Contribution by Prof. J.H. Blokdijk RA The problem can be illustrated with the following example. It involves invoices for goods or services received. It does not yet deal with the circumstance that many internal controls in this stage are no longer evidenced in visible form, but are embedded in the automated systems. Regarding those invoices, the auditor can easily reproduce the computation of the final amount and of a sales tax amount included in it. Reproducing the internal control on the price invoiced is more difficult: it may be in agreement with a price list from the supplier that the auditor may consult, but employees in the purchasing department are paid by the employing entity to obtain a better price. The difference may partly or wholly end up in their own pockets by way of the infamous kick-backs. Only a thorough knowledge of that particular market would enable the auditor to uncover such a defalcation; as he/she cannot be expected to have such expertise on all the markets where his/her clients do business, he/she must rely on the system of internal control.
  • 38. Contribution by Prof. J.H. Blokdijk RA Similar considerations apply to the receipt of goods and the performance of services. Some goods could be traced afterwards, though that may be highly impractical. Most office supplies, however, are simply used up, and as to services, it is virtually impossible to ascertain that the windows actually have been cleaned if the audit takes place three months after. For the most important aspects of those purchases, the auditor cannot do much more than look for evidence of the performance of internal control. So, there are internal controls that cannot be reproduced by the auditor. The issues raised by this circumstance have been explored extensively in Dutch auditing literature. The best English translation I have been able to find for this type of internal controls is: 'non-reproducible' internal controls (in Dutch: “onvervangbare interne controle”). Sometimes, investigative techniques designed to overcome the restrictions outlined above, do exist, but an independent auditor is not allowed to use them. An example is the situation in which an auditor has suspicions about a credit note purportedly granted by his/her client to another company audited by a partner of his/her own audit firm. The professional rule of confidentiality does not permit the former auditor to consult the latter on this document.
  • 39. Contribution by Prof. J.H. Blokdijk RA ‘ Non-reproducible’ internal controls Even though there are internal controls that can be reproduced, such as those involving arithmetical operations, the most important ones often cannot be reproduced. The fundamental causes have been categorized as follows: (1) expertise: the auditor cannot possibly acquire sufficient expertise to form, entirely by himself, a conclusive opinion on all the technical and/or commercial events that are to be reflected in the financial statements (e.g., product yield rates, purchase prices); (2) presence: the auditor cannot possibly be continuously present on the client's premises in order to ensure the completeness of the recording of transactions and (relevant) events; apart from economic considerations, this is unacceptable in that it would jeopardize the client's and/or the auditor's independence; and (3) inadmissibility of investigative techniques: the independent auditor is not entitled to use certain techniques that are available to government auditors (such as informing other government auditors about other taxpayers), or that may be used by police authorities (such as wiretaps, search of private premises and the like).
  • 40. Contribution by Prof. J.H. Blokdijk RA So what should auditors do about ‘the system of internal control’? Firstly, they should evaluate the design of the system. Especially important is the segregation of duties; e.g., no single person should be able to authorize payment of invoices, and persons charged with the authorization of separate elements (quantity, quality, prices) of invoices should not have an interest in collusion with each other, or with suppliers or other parties outside the auditee. In order to better evaluate the design of the internal control system, dr. Elsas has developed a very promising automated technique, which he will be glad to further explain.
  • 41.
  • 42. Supercycle: top-level business process Schmalenbach (1929), Limperg (1926, 1930’s), Abr. Mey (1936), Burgert (1957), Starreveld (1962, 1980’s), Frielink (1980’s), Blokdijk (1975), Veenstra (1972, p.41) Buy Side Sell Side Inside (cost price) Sell price Buy price A rectangle represents a state, a balance sheet item A circle represents a (trans)action, an activity, a mutation to connected states ‘ Soll’ (To Be) & ‘Ist’ (As Is) modalities
  • 43.
  • 44. Supercycle-based auditing, model-based auditing … Begin End Purchase price Sales price Buy transaction Money buffer Goodsbuffer Sell transaction What happened in between? What is the normative relation?
  • 45. Supercycle-based auditing 10,000’s man years of conceptualization and abstraction, integrated with proof in practice, over decades Worldwide recognized high quality audit education: 3-years post-Master Integrating owner-ordered audit method & management-ordered audit method into two-way audit approach Traditional Dutch audit education literature, Frielink et al. Mathematical framework: system of linear equations, based on the BETA-formula World’s scientifically strongest audit approach, due to its mathematical foundation How the spanning reconciliation checks, based on spanning equations, relate to the supercycle Superbly suited for powerful computational support
  • 46.  
  • 47.
  • 48.
  • 49.
  • 50.
  • 51. Supercycle & AO/IC The owner-ordered tradition introduces the concept of a quasi-goods stream for bonus rights – integrated within the regular stream of goods and services (see diagram) – allowing for an integral assessment of the authorization and incentive structure, as key component of the irreplaceable and indispensable internal control Here we’re in a smart auditing course, which may raise the question “Is there dumb auditing?” See: challenge no. 1, slide 14 & 17
  • 52. Accounting Organization / Internal Control (AO/IC) 1. Control measures vs. check & control activities 2. Preventive, detective & corrective 5. Irreplaceable vs. replaceable; indispensable 4. First-time recording vs. using existing recordings 6. Preventive securing of actions of agents vs. values; check point 7. Direct change of value vs. no direct change of value; outside 8. Segregation of duties; audit-technical vs. business-economical pp.38-43 3. Design, implementation & operation
  • 53.
  • 54.
  • 55.
  • 56.  
  • 57.
  • 58. Process-based Cost Price: connector for stream of money and stream of goods & services volume cost price spanning supercycle Forecasted volume vs. realized volume Planning & Control The cost price captures the quantitative relation between resource use & produced products Relating the stream of goods and the stream of money, answering “What’s the gross margin per product type?”, as required for auditing the completeness assertion
  • 59.
  • 60.
  • 61. Part II New risk control mechanisms
  • 62.
  • 63.
  • 64.
  • 65. Supercycle: interface between organization & auditor http://www.ComputationalAuditing.com/images/Kring.swf 1. Purchase 2. Accept 3. Sales 4. Deliver & Collect 5. Pay 6. Collect Process Steps
  • 66. Soll: To Be, normative Ist: As Is, representative Soll & Ist modalities
  • 67.
  • 68.  
  • 69.  
  • 70. Qualitative: Cake cutting Mathematics, game theory How to use segregation of duties to let a group take care of getting an equal size of the cake for each member? Indeed, one cutter and the others are choosers: 1. Cutter cuts 2. Choosers choose 3. Cutter chooses If we look closer, it’s not only about duties, but also about sequence & parallelism of duty involvement. Switch steps 2 & 3 and it won’t work anymore. Protocol design & verification? Hint: use opposite interests to enforce fairness
  • 71.  
  • 72.  
  • 73. Qualitative Audit Analytics - SoD X-Raying Segregation of Duties: Support to Illuminate an Enterprise’s Immunity to Solo-Fraud Paper with two discussion articles, one by K. Matcham and one by R.S. Sriram, and with a response article, appeared as four separate articles together in the International Journal of Accounting Information Systems, June 2008 Quote from the response article: “Adequate SoD assessment and SoD design appears to be much more complex than could have been assumed without this methodical analysis” with thanks to P.M. Ott de Vries for discussing this quoted response Introduces an algebraic analysis technique that takes a supercycle-based body of authorizations as input, and delivers a complete linear basis that spans a space of singleton ‘black hole’ weak spots in the supercycle system of internal control, extensible from 1-agent, to 2-agent, etc. The concept of irreplaceable and indispensable internal control, especially segregation of duties and securing actions of agents, as developed in the owner-ordered audit tradition, allows a rationally rigorous analysis method, impossible with the segregation of duties concept from the management-ordered audit tradition Method answering the question if a body of authorizations is free of opportunities for traceless embezzlement, without need to collude Alternatively stated: Method locating who has too many authorizations in one hand creating a dangerous opportunity for traceless embezzlement, jeopardizing the integrity of financial statements See: challenge no. 1 slide 14 & 17
  • 74.
  • 75.  
  • 76.
  • 77.
  • 78.
  • 79.
  • 80. Jacquard: key audit phases 1. Ist supercycle mining Extend process mining to focus on client’s top-level business process 2. Soll supercycle identification Identify Soll supercycle in Ist smart flowchart 3. Continuous auditing Confront a stream of business events to Soll, close-to-real-time 4. Collect, collate & aggregate deviations automatically 5. Publish deviation top-10 on interactive supercycle dashboard. Interface to query the enterprise. iPhone app Next Generation Auditing: Data Assurance as a Service
  • 81. Jacquard: project goals 1. Design and implementation of DSL for representing supercycle business models 2. Querying of models: Pacioli DSL 3. Visualization of models Next Generation Auditing: Data Assurance as a Service 4. Parsing, extraction & analysis of business data 5. Interpretation & inclusion of business data in model 6. DSL for structured auditing interviews via interactive audit documentation (expert vs. engagement team) 7. Facilitating automatic generation of XBRL & XBRL Formula (Standard Business Reporting, SBR): XBRL for data, DSL for analysis
  • 82. Phase 1: Ist supercycle mining Input : event log with journals, e.g. SAP Output : smart flowchart Based on: “Towards a Computer-Assisted Audit Analysis of Business Processes: Process Mining as Tool for IT Auditors”, Maria Bezverhaya, Emiel Caron & Piet Goeyenbier, ‘de EDP-Auditor’, NOREA, 2009 Push signal from Technical University of Eindhoven, ProM, Fluxicon & Anne Rozinat Pull signal from audit practitioners & IT audit educators, e.g. “Process Mining” by Mieke Jans & CARLAB, Rutgers, 2010 Computational Auditing: - focus on discovery of supercycle - framing stand-alone workflows - connecting to cost price theory: - activity-based costing - process-based costing - supercycle-based costing
  • 83.  
  • 84. Phase 2: Identify Soll in Ist Identify Soll supercycle by excluding Ist flows, based on automatically identified candidate Ist flows Based on: “Towards a Computer-Assisted Audit Analysis of Business Processes: Process Mining as Tool for IT Auditors”, Maria Bezverhaya, Emiel Caron & Piet Goeyenbier, ‘de EDP-Auditor’, NOREA, 2009 Push signal from Technical University of Eindhoven, ProM, Fluxicon & Anne Rozinat Apply constraints to check if remaining model is a valid Soll Analyzing 3232 cases, classi-fying casualties (red arrows): A . Invoice receipt without prior approval (2537x) B . Approval acquired after pur- chase completion (261x) C . Purchase order established for rejected request (9x) D . Handled order status skip- ping receipt (875x), etc. Design-time workflow vs. run-time workflow Pull signal from audit practitioners & IT audit educators, e.g. “Process Mining” by Mieke Jans & CARLAB, Rutgers, 2010 D A C B
  • 85. Scientific foundation: rationally rigorous. With mathematical & computational formalization. Superbly suited for the digital age. Recognized as such in accelerating pace. Easy by new tech Top-cycle: normative backbone of the ‘business process’-oriented audit approach Top-cycle concept & typology: Central result of integral evolution. Of ‘business process’-oriented Auditing Theory , Auditing Practice & Auditing Education . Over 60-80 years Typology of top-cycles: ordered by the strength of the backbone Unfortunately hardly translated into English Phase 2: Identify Soll supercycle in Ist Soll identification is supported by a typology of top-cycles
  • 86. Phase 3: Continuous auditing http://www.ComputationalAuditing.com/images/Kring.swf Confront a stream of business events to Soll Interrelate all buffer contents Reconcile with external evidence On-the-fly, close-to-real-time checking of spanning business equations Especially spanning buy side & sell side Triangulation Capture deviations and associated risks 3rd party evidence processing “ Continuity Equations” Miklos Vasarhelyi et al. CARLAB, Rutgers, 2010
  • 87.  
  • 88.  
  • 89. Phase 4: Aggregate deviations Based on: Sun, Srivastava & Mock, 2006 “An Informa-tion Systems Security Risk Assessment Model”, pp. 43-48 Fully Automatic Semi Automatic This can be realized in Deloitte’s Smart Audit Support with a plug-in for Dempster-Shafer-Srivastava confidence-level computations Manual Player
  • 90.
  • 91. Phase 5: Publish deviation top-10 Publish on interactive dashboard Supercycle as dashboard Drill-down on analytics Planning & Control Key Performance Indicators (KPI’s) Key Control Indicators (KCI’s) C b f t F m d D s t A t L f t P t P t W t A t A t S A A L F L F L F M M D F D C B F B F W P P P P W A A A A C m D f t S t A t F t B f t B f t P t W t L f 225 25 200 225 500 25 25 1,000 400 400 100 20 20 20 20 500 400
  • 92. Jacquard project: Next Generation Auditing: Data Assurance as a Service demo by Jacques de Swart, PricewaterhouseCoopers & Paul Griffioen, CWI More on the Jacquard project at the 21st World Continuous Auditing & Reporting Symposium, Rutgers, New Jersey, November 5-6, 2010
  • 93.
  • 94.  
  • 95.
  • 96.
  • 97.
  • 98.
  • 99.
  • 100.  
  • 101.

Editor's Notes

  1. In between Initial & Final States. Normative relationship between 1. generated margin and 2. amount of labour, frequency of business transactions
  2. Example BETA-equation system from Frielink’s et al. Auditing Education Literature 10,000’s man years of conceptualization. proven in practice, over decades. Recognized High Quality Audit. Very well suited for automated support. As is already done + pilots.
  3. The Flow of Money is presented above the horizontal line “from right to left”. The Flow of Goods/Services is below and “from left to right”. Animation. Not for simulation: real data. Diagram of the value cycle for a commercial business in a format the computer can understand and analyze. A sales results on one hand in a sales order and on the other hand in a $2 debtor. A purchase results in a $1 creditor and a purchase order. Section I contains money due FROM others (debts of others, other companies, to this company; the debtors, the company’s accounts receivable); Section II , contains money due TO others (other companies; the creditors, the company’s accounts payable). Section III contains goods/services due FROM other companies, and Section IV contains goods/services due TO other companies, or private individuals. The two Sections N show the company’s possessions in cash and goods. The diagram shows the value cycle in an error-free Soll modality. However, this value cycle also exists in an Ist modality, in which also erroneous, illegitimate transactions are recognized in addition to the error-free, legitimate ones. These erroneous transactions may or may not be intentional. The diagram for the Ist value cycle is automatically generated from that for the Soll. The cash flow runs above the horizontal line; the flow of goods and services, below it. Section I contains the company’s accounts receivable; Section II , its accounts payable. Section III contains goods and services due from other companies and Section IV contains goods and services due to other companies. The two Sections N show the company’s possessions in cash and goods. * Executable Model * - in “Play” mode, extremely close to Mental Model Shows illustrative process: Purchase, 2. Accept Goods, 3. Sales, 4. Collect(1st) & Deliver [concurrently], 5. Pay and 6. Collect(2nd) Results in: one coin, margin between sales price ($2) and purchase price ($1) Transformation process. Transforming transaction occurrences, labour, into margin. Abstract machine/model to transform labour into margin. Normative relation between amount of labour and amount of margin. Process mathematics: Petri nets -> Audit nets. Quantitative: Reachability, spanning checks, Initial & Final State (inspected) Qualitative: T-invariants for auth & able
  4. Modalities: Soll (as it should be, normative) & Ist (as it is, reality) German, Schmalenbach Soll Process Structure - Ist Process Structure Arrows: Confrontation (mental) Model based audit
  5. Constraints. E.g. on associating agents to buffers, for Auth & Able. Alert for Able: ‘ Other maintenance resources’: include ‘f’ ‘ Maintenance man-hours’: include ‘f’ No alerts for agent associations to transactions.
  6. Structural A-Invariant for Soll system BETA-equation is just projection/selection for one buffer
  7. The Flow of Money is presented above the horizontal line “from right to left”. The Flow of Goods/Services is below and “from left to right”. Animation. Not for simulation: real data. Diagram of the value cycle for a commercial business in a format the computer can understand and analyze. A sales results on one hand in a sales order and on the other hand in a $2 debtor. A purchase results in a $1 creditor and a purchase order. Section I contains money due FROM others (debts of others, other companies, to this company; the debtors, the company’s accounts receivable); Section II , contains money due TO others (other companies; the creditors, the company’s accounts payable). Section III contains goods/services due FROM other companies, and Section IV contains goods/services due TO other companies, or private individuals. The two Sections N show the company’s possessions in cash and goods. The diagram shows the value cycle in an error-free Soll modality. However, this value cycle also exists in an Ist modality, in which also erroneous, illegitimate transactions are recognized in addition to the error-free, legitimate ones. These erroneous transactions may or may not be intentional. The diagram for the Ist value cycle is automatically generated from that for the Soll. The cash flow runs above the horizontal line; the flow of goods and services, below it. Section I contains the company’s accounts receivable; Section II , its accounts payable. Section III contains goods and services due from other companies and Section IV contains goods and services due to other companies. The two Sections N show the company’s possessions in cash and goods. * Executable Model * - in “Play” mode, extremely close to Mental Model Shows illustrative process: Purchase, 2. Accept Goods, 3. Sales, 4. Collect(1st) & Deliver [concurrently], 5. Pay and 6. Collect(2nd) Results in: one coin, margin between sales price ($2) and purchase price ($1) Transformation process. Transforming transaction occurrences, labour, into margin. Abstract machine/model to transform labour into margin. Normative relation between amount of labour and amount of margin. Process mathematics: Petri nets -> Audit nets. Quantitative: Reachability, spanning checks, Initial & Final State (inspected) Qualitative: T-invariants for auth & able