2013
DOI: 10.1016/j.accinf.2012.06.015
|View full text |Cite
|
Sign up to set email alerts
|

The case for process mining in auditing: Sources of value added and areas of application

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
53
0
3

Year Published

2014
2014
2020
2020

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 118 publications
(56 citation statements)
references
References 10 publications
0
53
0
3
Order By: Relevance
“…Examples of CCM are procedures for monitoring access controls and authorizations, system configurations, and business process settings; while CDA includes procedures for verifying master data, transactions, and key process metrics using analytics (Alles et al 2006(Alles et al , 2008. Jans et al (2013) explore the implications to both external and internal audit of process mining the event logs captured by ERP systems and provide a detailed description of how this procedure is used for control monitoring and data assurance. Following the standard route in technology adoption, the manual audit procedures are being automated and, subsequently, reengineered to fully exploit the capabilities of the technology (Jans et al 2013).…”
Section: 1background Of the Studymentioning
confidence: 99%
See 1 more Smart Citation
“…Examples of CCM are procedures for monitoring access controls and authorizations, system configurations, and business process settings; while CDA includes procedures for verifying master data, transactions, and key process metrics using analytics (Alles et al 2006(Alles et al , 2008. Jans et al (2013) explore the implications to both external and internal audit of process mining the event logs captured by ERP systems and provide a detailed description of how this procedure is used for control monitoring and data assurance. Following the standard route in technology adoption, the manual audit procedures are being automated and, subsequently, reengineered to fully exploit the capabilities of the technology (Jans et al 2013).…”
Section: 1background Of the Studymentioning
confidence: 99%
“…Jans et al (2013) explore the implications to both external and internal audit of process mining the event logs captured by ERP systems and provide a detailed description of how this procedure is used for control monitoring and data assurance. Following the standard route in technology adoption, the manual audit procedures are being automated and, subsequently, reengineered to fully exploit the capabilities of the technology (Jans et al 2013). …”
Section: 1background Of the Studymentioning
confidence: 99%
“…El riesgo tecnológico en términos de auditoría puede ser definido como la probabilidad que la información almacenada en los sistemas pueda contener errores importantes que pasen sin ser detectados durante el transcurso de la auditoría (Jans, Alles, & Vasarhelyi, 2013). Del mismo modo Dzeng (1994) definió que el riesgo tecnológico está influenciado por el riesgo inherente y el riesgo de control.…”
Section: Riesgo Tecnológicounclassified
“…For the process mining introduction, the interested reader is also referred to the process mining website www.processmining.org. Process mining was successfully applied in a set of business areas, such as healthcare [16,31,21], insurance [25], auditing [12], hardware test processes [22] and even vessel behavior [15]. In this paper we present case studies from the other application area -tourist industry.…”
Section: Related Workmentioning
confidence: 99%