Search results

1 – 10 of over 2000
Article
Publication date: 13 April 2012

Ka I. Pun, Yain Whar Si and Kin Chan Pau

Intensive traffic often occurs in web‐enabled business processes hosted by travel industry and government portals. An extreme case for intensive traffic is flash crowd situations…

1364

Abstract

Purpose

Intensive traffic often occurs in web‐enabled business processes hosted by travel industry and government portals. An extreme case for intensive traffic is flash crowd situations when the number of web users spike within a short time due to unexpected events caused by political unrest or extreme weather conditions. As a result, the servers hosting these business processes can no longer handle overwhelming service requests. To alleviate this problem, process engineers usually analyze audit trail data collected from the application server and reengineer their business processes to withstand unexpected surge in the visitors. However, such analysis can only reveal the performance of the application server from the internal perspective. This paper aims to investigate this issue.

Design/methodology/approach

This paper proposes an approach for analyzing key performance indicators of traffic intensive web‐enabled business processes from audit trail data, web server logs, and stress testing logs.

Findings

The key performance indicators identified in the study's approach can be used to understand the behavior of traffic intensive web‐enabled business processes and the underlying factors that affect the stability of the web server.

Originality/value

The proposed analysis also provides an internal as well as an external view of the performance. Moreover, the calculated key performance indicators can be used by the process engineers for locating potential bottlenecks, reengineering business processes, and implementing contingency measures for traffic intensive situations.

Details

Business Process Management Journal, vol. 18 no. 2
Type: Research Article
ISSN: 1463-7154

Keywords

Article
Publication date: 1 June 2004

Caroline Allinson

A question is posed; have audit and control of information in a high security environment, such as law enforcement, improved or not in the transition from manual to electronic…

2984

Abstract

A question is posed; have audit and control of information in a high security environment, such as law enforcement, improved or not in the transition from manual to electronic processes? This paper attempts to elucidate this question by a thorough examination of information collection, control of processing and audit in manual processes used by the Queensland Police Service, Australia, during the period 1940‐1980. It assesses those processes against current electronic systems essentially introduced to policing in the decades of the 1980s and 1990s. The results of this assessment show that electronic systems provide for faster communications with centrally controlled and updated information readily available for use by large number of users connected across significant geographical locations. It is clearly evident that the price paid for this is a lack of ability and/or reluctance to provide improved audit and control processes. Thus, the claim can be made that audit and control processes may be considered to have been downgraded in the electronic world where standard commercial systems are used.

Details

Policing: An International Journal of Police Strategies & Management, vol. 27 no. 2
Type: Research Article
ISSN: 1363-951X

Keywords

Article
Publication date: 1 October 2004

Suresh Chalasani and Jayavel Sounderpandian

In this paper, we propose a set of standard benchmarks for evaluating B2B supply chain information systems. The supply chain management systems that we focus on communicate…

1994

Abstract

In this paper, we propose a set of standard benchmarks for evaluating B2B supply chain information systems. The supply chain management systems that we focus on communicate between collaborating partners via the Internet using such languages as the extensible markup language. We divide the benchmarks into three distinct categories: benchmarks to study the performance of querying a partner's data, modifying a partner's data, transmitting large amounts of data between partners. We propose a model for estimating the data‐communication and computation times incurred by the B2B information system using the above benchmarks. In addition, we discuss an algorithm for equitable sharing of the costs of a virtual private network by the partners. We present numerical examples to describe an actual application of the above models.

Details

Benchmarking: An International Journal, vol. 11 no. 5
Type: Research Article
ISSN: 1463-5771

Keywords

Article
Publication date: 1 May 1997

Pauline Ratnasingham

Defines the rationale for developing a model of EDl risks and associated controls. Highlights how and which EDI controls will alleviate and/or eliminate the specified EDI risks…

1886

Abstract

Defines the rationale for developing a model of EDl risks and associated controls. Highlights how and which EDI controls will alleviate and/or eliminate the specified EDI risks. The findings of the seven case studies identified additional EDI risks and controls, which paved the way for a new mapping of relationships between risks and controls. Offers a further insight into the perceptions of and responses to security threats faced by organizations in adopting EDI.

Details

Information Management & Computer Security, vol. 5 no. 2
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 18 October 2011

Alexandra Kanellou and Charalambos Spathis

The purpose of this article is to provide a selective and comprehensive literature review based on previous research within auditing and enterprise systems (ES). This is done to…

3671

Abstract

Purpose

The purpose of this article is to provide a selective and comprehensive literature review based on previous research within auditing and enterprise systems (ES). This is done to identify research gaps, propose directions for future research and guide researchers and practitioners on how to better synthesize these two areas. Interaction between ES and auditing is in need of more academic research and practical investigation, which may lead to the development of better solutions, guidelines and frameworks.

Design/methodology/approach

A total of 31 academic studies from 2000 to 2010 were included in this study. After reading these studies, different areas had been selected and were addressed in five categories: the future of audit in ES environment, modern audit tools and techniques, changes of auditors' role, differences in perceptions between financial auditors and IT auditors, ERP and compliance with regulations.

Findings

ES implementation results in audit process reengineering and increases the need of continuous monitoring of transactions. The presence of IT auditors becomes critical, while financial auditors are asked to enhance their skills in order to be able to conduct effective audit tests. Modern audit tools and techniques must be used so that internal control processes will be appropriate for an ES.

Research limitations/implications

It is not an exhaustive list and some relevant publications might have been overlooked. Much literature has been scanned by reading the title only. In order to conduct a comprehensive review the topical focus was kept relatively narrow on auditing and ES.

Practical implications

Researchers and practitioners must take into consideration the interaction between ES and auditing in order to advance research in this area. Companies must understand the changes that occur in the audit procedure due to ES implementation, so that they will design efficient audit tests and auditors must enhance their knowledge in order to be able to conduct these tests effectively.

Originality/value

This study uncovers and classifies current research within auditing and ES (focusing mostly on ERP systems).

Article
Publication date: 3 August 2012

Alma Whiteley

The purpose of this paper is to provide a comprehensive narrative account of supervisory conversations with doctoral students. They include providing knowledge and experience…

1166

Abstract

Purpose

The purpose of this paper is to provide a comprehensive narrative account of supervisory conversations with doctoral students. They include providing knowledge and experience about the nature of qualitative and quantitative approaches and their respective histories and rigour requirements.

Design/methodological/approach

An introduction reveals the complexity, debates and dialectics that are engaged with during the doctoral supervisory process. Two design issues are discussed. One is research design; the other is supervisor method.

Findings

Rigour in interpretive research is distinctive, linked to its characteristics and the unique role of the researcher as an instrument of data collection, conscious of the need to give voice to respondents and preserve their authentic responses. The audit trail is a centrepiece for both rigour and the reflection, reflexivity necessary to address ongoing biases, decisions and dilemmas.

Research limitations/implications

Supervisory conversations are dynamic but there is a core, a set of initial conditions and these relate to the ethics and integrity of the doctoral student and the supervisor.

Originality/value

The paper penetrates the social space where supervisors and doctoral students interact. Within the text, “advice” and seminal ideas are presented from literature and the supervisor's experience that will inform researchers and demonstrate a supervisor method.

Details

Qualitative Research Journal, vol. 12 no. 2
Type: Research Article
ISSN: 1443-9883

Keywords

Article
Publication date: 23 November 2012

James Brigagliano, Kevin Campion, David Katz and Andrew Blake

The purpose of this paper is to explain the requirements of SEC Rule 613 under the Securities Exchange Act of 1934, which requires national securities exchanges and FINRA jointly…

254

Abstract

Purpose

The purpose of this paper is to explain the requirements of SEC Rule 613 under the Securities Exchange Act of 1934, which requires national securities exchanges and FINRA jointly to develop a national market system plan (NMS Plan) that provides for the creation, implementation and maintenance of a consolidated order tracking system (“consolidated order trail” or “CAT”) as well as the creation of a central repository responsible for the receipt, consolidation, and retention of all order and quote information for NMS securities.

Design/methodology/approach

The paper discusses weaknesses of current, multiple order tracking systems; core features of the framework adopted by the SEC to create a CAT, including the creation of a central repository; key considerations for market participants, including data reporting methods and funding the creation, implementation and maintenance of the CAT; timing and phased implementation of the NMS Plan; security and order types covered by the CAT; persons required to report information to the central repository; reportable events and CAT data elements; timing and reporting to the central repository; ownership, governance and operation of the central repository; access to CAT data; parties required to comply with Rule 613e and the NMS Plan; and governance and operation of the NMS Plan.

Findings

Under the requirements of Rule 613, and through the NMS Plan that must be developed by the exchanges and FINRA, the CAT is intended to provide a comprehensive and uniform tracking mechanism for secondary market activity in all NMS securities.

Originality/value

The paper provides guidance by experienced financial services lawyers.

Article
Publication date: 1 April 2001

Zabihollah Rezaee, Rick Elam and Ahmad Sharbatoghlie

Technological advances (e.g. e‐commerce and the Internet) have changed business practices and the process of recording and storing business transactions. Extensible Business…

11882

Abstract

Technological advances (e.g. e‐commerce and the Internet) have changed business practices and the process of recording and storing business transactions. Extensible Business Reporting Language (XBRL) will soon be built into accounting and reporting software which would allow on‐line real‐time preparation, publication, examination, and extraction of financial information. Thus, outside, independent auditors should use continuous, electronic auditing when most financial information exists only in electronic form under real‐time accounting systems. Continuous auditing and its implications for independent auditors, including internal control considerations and audit procedures, are described and analyzed.

Details

Managerial Auditing Journal, vol. 16 no. 3
Type: Research Article
ISSN: 0268-6902

Keywords

Article
Publication date: 2 February 2021

Adriana Tiron-Tudor, Delia Deliu, Nicoleta Farcane and Adelina Dontu

The purpose of this paper is to facilitate blockchain innovation immersion in accountancy organizations by providing tools that allow organizations to manage the change. The paper…

3438

Abstract

Purpose

The purpose of this paper is to facilitate blockchain innovation immersion in accountancy organizations by providing tools that allow organizations to manage the change. The paper approaches blockchain technology (BT) through the lens of organizational change management, with a specific focus at the organization level.

Design/methodology/approach

A hybrid systematic literature review of relevant literature is presented based on recent research papers published in highly ranked scientific journals that capture how accounting organizations might manage the changes induced by BT.

Findings

The findings of the review indicate that implementing BT requires some new modus operandi. From individual behavior to organizational structure, the advantages of blockchain must be emphasized in all accounting and auditing organizations. Managers should forge a plan that takes advantage of employees' skills, competencies and talent, implementing forward-looking company procedures and actively deciding how to navigate workplace dynamics, personalities and responsibilities.

Research limitations/implications

The main limitations of the study refer to the infancy of the BT and require the development of knowledge through future studies to allow a more accurate outline of the overall picture and a detailed one of the BT phenomena with applicability to accounting and auditing. At this stage, it is not yet possible to fully envision the implications of BT on professional accounting and auditing organizations. However, there will be clients who adopt BTs, so firms should work with them to understand BT-based accounting and auditing applications. That is, accounting and auditing organizations should expand their skills and knowledge to anticipate and meet clients' needs.

Practical implications

In a constantly digitalizing world, the traditional accounting and educational environment is changing but not quickly enough to meet the requirements of a blockchain accounting system yet. For this reason, practical implications on the daily activities of the organizations and the restructuration of their internal architecture have been revealed in this paper.

Originality/value

The paper approaches blockchain using the lens of organizational change management with a specific focus on the accounting and audit organizations, and it proposes solutions to cope with the arising technological challenges. A challenge itself is the implementation of blockchain, especially when an entity is not ready for the process. Therefore, the SWOT analysis elaborated in this paper and focused on the accounting and auditing firms is an element of novelty and at the same time, a helpful tool highlighting the main strengths, weaknesses, opportunities and threats of this technology, supporting organizations in assessing how ready they are for its adoption. The research on blockchain in accountancy organizations is still necessary for at least seven key areas which have been proposed and detailed at the end of the paper, bringing in this way clarity in regards to the most endorsed avenues for future research directions.

Details

Journal of Organizational Change Management, vol. 34 no. 2
Type: Research Article
ISSN: 0953-4814

Keywords

Article
Publication date: 13 April 2012

Munir Majdalawieh, Sofiane Sahraoui and Reza Barkhi

The pressure is on organizations to go beyond automating their internal audit activities and develop and integrate internal auditing into business processes of the enterprise…

1947

Abstract

Purpose

The pressure is on organizations to go beyond automating their internal audit activities and develop and integrate internal auditing into business processes of the enterprise. This paper aims to propose a “full power” continuous auditing (CA) model with three key components: electronic audit evidence functions; intra‐process auditing; and inter‐process auditing.

Design/methodology/approach

This paper follows a design science approach by identifying relevant problems from the current literature, defining the objectives of the study, designing and developing the “full power” CA model, and evaluating the model. The model supports business process‐centric auditing and enhances the business monitoring capacities of organizations enabling the fulfillment of increasingly stringent compliance requirements with internal policies as well as external regulations.

Findings

This work has attempted to fill the gap between the enterprise solutions offered by enterprise system providers and a structured approach to auditing within enterprise environments by proposing the IIPCA model which combines the automated controls inherent in the systems with continuous audits based on electronic audit evidence. The approach provides for auditing both within and between processes ensuring comprehensiveness of the audit process.

Originality/value

The paper makes a contribution by proposing a “full power” continuous auditing model on the principle of continuous monitoring and with predefined building block components; facilitating the integration of continuous auditing within business information processing in an enterprise using different building blocks; and giving practitioners insight on the adoption of the CA in the enterprise and how it will enhance their audit effectiveness, and audit efficiency.

Details

Business Process Management Journal, vol. 18 no. 2
Type: Research Article
ISSN: 1463-7154

Keywords

1 – 10 of over 2000