-
2
-
-
33745759332
-
Continuous monitoring of business process controls: a pilot implementation of a continuous auditing systems at Siemens
-
Alles M., Brennan G., Kogan A., and Vasarhelyi M.A. Continuous monitoring of business process controls: a pilot implementation of a continuous auditing systems at Siemens. Int J Account Inf Syst 7 (2006) 137-161
-
(2006)
Int J Account Inf Syst
, vol.7
, pp. 137-161
-
-
Alles, M.1
Brennan, G.2
Kogan, A.3
Vasarhelyi, M.A.4
-
3
-
-
4444362391
-
Restoring auditor credibility: tertiary monitoring and logging of continuous assurance systems
-
Alles M.G., Kogan A., and Vasarhelyi M. Restoring auditor credibility: tertiary monitoring and logging of continuous assurance systems. Int. J. Account. Inf. Syst. 5 (2004) 183-202
-
(2004)
Int. J. Account. Inf. Syst.
, vol.5
, pp. 183-202
-
-
Alles, M.G.1
Kogan, A.2
Vasarhelyi, M.3
-
4
-
-
1842503447
-
Fraud classification using principal component analysis of RIDITs
-
Brockett P.L., Derrig R.A., Golden L.L., Levine A., and Alpert M. Fraud classification using principal component analysis of RIDITs. J Risk Insur 69 3 (2002) 341-371
-
(2002)
J Risk Insur
, vol.69
, Issue.3
, pp. 341-371
-
-
Brockett, P.L.1
Derrig, R.A.2
Golden, L.L.3
Levine, A.4
Alpert, M.5
-
6
-
-
34249879013
-
Audit support systems and decision aids: current practice and opportunities for future research
-
Dowling C., and Leech S. Audit support systems and decision aids: current practice and opportunities for future research. Int J Account Inf Syst 8 (2007) 92-116
-
(2007)
Int J Account Inf Syst
, vol.8
, pp. 92-116
-
-
Dowling, C.1
Leech, S.2
-
7
-
-
45849128308
-
X-raying segregation of duties: support to illuminate an enterprise's immunity to solo-fraud
-
Elsas Ph.I. X-raying segregation of duties: support to illuminate an enterprise's immunity to solo-fraud. Int J Account Inf Syst 9 (2008) 82-93
-
(2008)
Int J Account Inf Syst
, vol.9
, pp. 82-93
-
-
Elsas, Ph.I.1
-
8
-
-
33646142056
-
Subscription fraud prevention in telecommunications using fuzzy rules and neural networks
-
Estévez P., Held C., and Perez C. Subscription fraud prevention in telecommunications using fuzzy rules and neural networks. Expert Syst Appl 31 (2006) 337-344
-
(2006)
Expert Syst Appl
, vol.31
, pp. 337-344
-
-
Estévez, P.1
Held, C.2
Perez, C.3
-
9
-
-
0002188610
-
Neural network detection of management fraud using published financial data
-
Fanning K., and Cogger K. Neural network detection of management fraud using published financial data. Int J Intell Syst Account, Finance Manag 7 (1998) 21-41
-
(1998)
Int J Intell Syst Account, Finance Manag
, vol.7
, pp. 21-41
-
-
Fanning, K.1
Cogger, K.2
-
10
-
-
33847668878
-
Complementary controls and ERP implementation success
-
Grabski S.V., and Leech S.A. Complementary controls and ERP implementation success. Int J Account Inf Syst 8 (2007) 17-39
-
(2007)
Int J Account Inf Syst
, vol.8
, pp. 17-39
-
-
Grabski, S.V.1
Leech, S.A.2
-
14
-
-
33749538589
-
A multi-line insurance fraud recognition system: a government-led approach in Korea
-
Kim H., and Kwon W.J. A multi-line insurance fraud recognition system: a government-led approach in Korea. Risk Manag Insur Rev 9 2 (2006) 131-147
-
(2006)
Risk Manag Insur Rev
, vol.9
, Issue.2
, pp. 131-147
-
-
Kim, H.1
Kwon, W.J.2
-
15
-
-
33751432287
-
Data mining techniques for the detection of fraudulent financial statements
-
Kirkos E., Spathis C., and Manolopoulos Y. Data mining techniques for the detection of fraudulent financial statements. Expert Syst Appl 32 (2007) 995-1003
-
(2007)
Expert Syst Appl
, vol.32
, pp. 995-1003
-
-
Kirkos, E.1
Spathis, C.2
Manolopoulos, Y.3
-
16
-
-
0007064499
-
Continuous online auditing: a program of research
-
Kogan A., Sudit E., and Vasarhelyi M. Continuous online auditing: a program of research. J Inf Syst 13 2 (1999) 87-103
-
(1999)
J Inf Syst
, vol.13
, Issue.2
, pp. 87-103
-
-
Kogan, A.1
Sudit, E.2
Vasarhelyi, M.3
-
18
-
-
36549022484
-
Internal and external influences on IT control governance
-
Li C., Lim J.-H., and Wang Q. Internal and external influences on IT control governance. Int J Account Inf Syst 8 (2007) 225-239
-
(2007)
Int J Account Inf Syst
, vol.8
, pp. 225-239
-
-
Li, C.1
Lim, J.-H.2
Wang, Q.3
-
19
-
-
0242467571
-
Understanding the potential impact of information technology on the susceptibility of organizations to fraudulent employee behaviour
-
Lynch A., and Gomaa M. Understanding the potential impact of information technology on the susceptibility of organizations to fraudulent employee behaviour. Int J Account Inf Syst 4 (2003) 295-308
-
(2003)
Int J Account Inf Syst
, vol.4
, pp. 295-308
-
-
Lynch, A.1
Gomaa, M.2
-
20
-
-
13844252356
-
Latent class models for clustering: a comparison with k-means
-
Magidson J., and Vermunt J.K. Latent class models for clustering: a comparison with k-means. Can J Mark Res (2002)
-
(2002)
Can J Mark Res
-
-
Magidson, J.1
Vermunt, J.K.2
-
21
-
-
63249092704
-
An evidential reasoning approach to Sarbanes-Oxley mandated internal control risk assessment
-
Mock T.J., Sun L., Srivastava R., and Vasarhelyi M. An evidential reasoning approach to Sarbanes-Oxley mandated internal control risk assessment. Int J Account Inf Syst 10 (2009) 65-78
-
(2009)
Int J Account Inf Syst
, vol.10
, pp. 65-78
-
-
Mock, T.J.1
Sun, L.2
Srivastava, R.3
Vasarhelyi, M.4
|