The case for process mining in auditing: Sources of value added and areas of application

被引:82
作者
Jans, Mieke [1 ]
Alles, Michael [2 ]
Vasarhelyi, Miklos [2 ]
机构
[1] Hasselt Univ, Hasselt, Belgium
[2] Rutgers Business Sch, Newark, NJ USA
关键词
Event logs; Process mining; Internal auditing; Continuous auditing;
D O I
10.1016/j.accinf.2012.06.015
中图分类号
F [经济];
学科分类号
02 ;
摘要
Process mining aims to extract knowledge from the event logs maintained by a company's ERP system. The objective of this paper is to make the case for why internal and external auditors should leverage the capabilities process mining offers to rethink how auditing is carried out. We do so by identifying the sources of value added of process mining when applied to auditing, which are as follows: 1. process mining analyzes the entire population of data and not just a sample; 2. critically that data consists of meta-data-data entered independently of the actions of auditee-and not just data entered by the auditee; 3 process mining allows the auditor to have a more effective way of implementing the audit risk model by providing effective ways of conducting the required walkthroughs of processes and conducting analytic procedures; 4. process mining allows the auditor to conduct analyses not possible with existing audit tools, such as discovering the ways in which business processes are actually being carried out in practice, and to identify social relationships between individuals. It is our argument that these sources of value have not been fully understood in the process mining literature, which has focused on developing it as a statistical methodology rather than on applying it to audit practice. Only when auditors and audit researchers appreciate what is new and unique about process mining will its acceptance in auditing practice become feasible. (C) 2012 Elsevier Inc. All rights reserved.
引用
收藏
页码:1 / 20
页数:20
相关论文
共 22 条
[1]  
Alles M., 2004, INT J ACCOUNTING INF, V5, P183
[2]  
Debreceny RS, 2010, CAUSES CONSEQUENCES
[3]  
Gehrke N., 2010, P 16 AM C INF SYST L
[4]  
Hirst D.E., 1996, CONTEMP ACCOUNT RES, V13, P457, DOI DOI 10.1111/J.1911-3846.1996.TB00511.X
[5]  
Jans M., 2009, The International Journal of Digital Accounting Research, V9, P1, DOI DOI 10.4192/1577-8517-V9_1
[6]  
Jans M, 2009, THESIS HASSELT U DIE
[7]  
Kogan A, 2010, ANAL PROCEDURE UNPUB
[8]   Proclets in healthcare [J].
Mans, R. S. ;
Russell, N. C. ;
van der Aalst, W. M. P. ;
Bakker, P. J. M. ;
Moleman, A. J. ;
Jaspers, M. W. M. .
JOURNAL OF BIOMEDICAL INFORMATICS, 2010, 43 (04) :632-649
[9]  
Prosch M, 2010, PRIVACY DESIGN UNPUB
[10]  
Rozinat A, 2008, LECT NOTES COMPUT SC, V4928, P84