A Business Process Gap Detecting Mechanism Between Information System Process Flow and Internal Control Flow
A Business Process Gap Detecting Mechanism Between Information System Process Flow and Internal Control Flow
Department of Accounting & Information Technology, National Chung-Cheng University, Chia-Yi, Taiwan, ROC
Department of DSC & MIS, Miami University, Oxford, OH 45056, USA
Department of Management Information Systems, National Chung-Cheng University, Chia-Yi, Taiwan, ROC
a r t i c l e
i n f o
Article history:
Received 26 March 2008
Received in revised form 26 February 2009
Accepted 15 April 2009
Available online 22 April 2009
Keywords:
Computer-Assisted Audit Techniques and
Tools (CAATTs)
Business process gap detecting mechanism
Database log
Resource and value dependence method
Internal control ow
a b s t r a c t
The information system (IS) has become an important backbone of the modern enterprise, which has caused
electronic data generated by the IS to be more easily manipulated and destroyed than hardcopy data. It is
therefore important for auditors to assure that the IS is well-controlled and secure. Auditors generally use
Computer-Assisted Audit Techniques and Tools (CAATTs) to assist them in auditing the IS, though given the
growing complexity of these systems, it is hard to completely perform a control test of the systems. This
research aims to develop a mechanism, namely the Business Process Gap Detecting Mechanism (BPGAPDetecting Mechanism), to automatically detect the business process gap between IS processes and internal
control ows. This study also justies the feasibility of BPGAP-Detecting Mechanism by providing a real case
study. The result indicates that the BPGAP-Detecting Mechanism can assist the case company in resolving
data quality problems that have occurred in its ERP (Enterprise Resource Planning) system and can also
provide additional information for the company.
2009 Elsevier B.V. All rights reserved.
1. Introduction
During the last several decades, the information system (IS) has
become the backbone of the modern enterprise because of its
efciency and effectiveness. However, electronic data generated by
the IS have become easier to change, manipulate, or destroy. These
aspects of IS have created an easier way for crime to take place [16].
This fact was quantied in the 2005 Computer Crime and Security
Survey, which revealed that losses caused by computer crimes and
computer security breaches were $130,104,542 for the 639 respondents in 2005 [17]. Hence, it is important for auditors to assure that ISs
are adequately controlled, secured, and function as intended [39].
Reassuring IS security in the modern business environment
requires a complete understanding of the continuous events that
comprise the way businesses organize their activities. An important
way to attain this understanding is to deconstruct a business into its
underlying business processes [5]. It should be noted that the
SarbanesOxley (SOX) Act [44] requires both managers and auditors
to force rms to follow their business activities more closely and verify
Corresponding author. Tel.: +1 513 529 4827 (ofce); fax: +1 513 529 9689.
E-mail addresses: [email protected] (S.-M. Huang), [email protected]
(D.C. Yen), [email protected] (Y.-C. Hung), [email protected]
(Y.-J. Zhou), [email protected] (J.-S. Hua).
1
Tel.: +886 4 272 0411x16811.
0167-9236/$ see front matter 2009 Elsevier B.V. All rights reserved.
doi:10.1016/j.dss.2009.04.011
the IS process ow, but audit the activities conducted during the IS
process ow itself. For some complex information systems, they need
to perform more control tests rather than only substantive tests or
control tests in order to reduce the audit risk to an appropriate level
[57].
It is doubtless that CAATTs can help auditors to audit the IS in
either a static or dynamic way. Although many CAATTs were proposed
in the past two decades, they are still in their infancy and possess
some limitations and drawbacks. Generalized Audit Software (GAS),
Parallel Simulation, Test Data, and Integrated Test Facility (ITF) focus
on the output data produced by the IS. They provide the substantive
test and risk assessment, and cannot detect the business process gap
between the IS process ow and the internal control ow. Although
the concept and execution of the control test are not difcult to realize,
the prototype systems/commercial software which can perform the
control test are limited.
An Embedded Audit Module can detect the business process gap
between the IS process ow and the internal control ow by working
with the IS. However, it is difcult to construct a general system which
can combine with different IS. Additionally, client cooperation is also a
disadvantage of Embedded Audit Module [20], as auditees are not
always willing to be cooperative with auditors, whose applications
affect their IS. In short, because of the complexity of the IS without
combining the CAATTs with these systems, it is difcult to conduct the
entire control test of the IS.
As a result, this paper aims to propose a mechanism to automatically perform a control test of the IS of rms. This prototype
system is expected to achieve the following objectives:
automatically identify the internal control for the audit objects;
automatically identify the IS process ow for the audit objects;
automatically compare the internal control ow with the IS ow to
detect any differences between these two ows.
In addition to the aforementioned objectives, this study can also be
recognized as an effective development practice which can provide
the structured form, formal logic and mathematical algorithm for the
whole auditing process and can be used as a reference for future
researchers and practitioners.
2. Literature review
2.1. Computer-assisted audit techniques and tools
Over the past two decades, several CAATTs were proposed by prior
studies of auditing [11,13,15,20,36,43], such as GAS, Parallel Simulation, Test data, ITF, the Embedded Audit Module, and so on. This study
classies them into three categories: Substantive Tests, Control Tests,
and Hybrid Tests including both Substantive Tests and Control Tests.
The classication of CAATTs is tabulated in Table 1.
Table 1
Classication of computer-assisted audit techniques and tools.
Test type
CAATTs
Estimated by
Degree of
embedded on
client's system
Software
Substantive
test
Generalized Audit
Software(GAS)
Parallel Simulation
Test data
Integrated Test
Facility (ITF)
Embedded audit
module
Output data
N/A
ACL/IDEA
Output data
Output data
Output data
N/A
N/A
Middle
N/A
N/A
N/A
System processing/
output data
High
Oracle/SQL
Server /IBM
DB2
Control test
Both
437
438
Table 2
Classication of the dynamic modeling tools.
Table 3
Mapping dynamic modeling tools to Petri-Net.
Classication
Description
Modeling tools
XML
Software
Author
Modeling tools
Year
Workow
model
N/A
EPML
EPML
BPEL
N/A
UXF
DFD to Petri-Net
EPC to Petri-Net
UML Activity Diagrams to Petri-Net
IDEF0 to IDEF3 and IDEF3 to Petri-Net
IDEF0 and IDEF3 to Petri-Net
1992
1999
2001
2001
2004
Visio
Visio
AXIS/Visio
N/A
BPWIN
Rational
Rose/Visio
Visio
ARIS/Visio
Rational
Rose
Data ow
model
Flowchart
EPC
eEPC
BPMN
IDEF3
UML activity
diagram
DFD
eEPC
UML
interaction
diagram
Petri Net
IDEF2
Mathematical
model
N/A
EPML
UXF
PNML
N/A
CPN Tool
Witness
the tokens will be removed from the input places and are added to the
output places according to the weight of the input arc and output arc
[2,31]. Then the conditions or the resources of the systems are said to
be changed or moved from one to another one, and the marking of the
Petri-Net is updated to represent the new state.
2.4. Reachability analysis of the Petri-Net
properties of the IS. The purpose of the dataow model is to depict the
dynamic dataow through the processes. The workow model and
dataow model can contain the fundamental ows of the IS, but they
cannot provide any simulation and analysis method. Therefore, to
simulate and analyze the system, a mathematical model is needed.
Mathematical models can depict the IS by using graphical notation
and performing dynamic simulation and mathematical analysis on the
model.
2.3. The mathematical model: Petri-Net
Petri-Net is a mathematical modeling tool which was invented by
C. A. Petri (1962) to describe and simulate the concurrent processes
of the networks [58]. It provides both graphical description and
mathematical analysis capabilities and is widely used in simulating
and analyzing the concurrent, asynchronous, distributed, and
stochastic systems [28,37,54].
A Petri-Net is dened by 5 tuples:
PN = (P, T, F, W, M), where:
When the transitions are ring, which means the processors, the
tasks, or the functions of the systems are executing, the numbers of
3. System architecture
The objective of this research is to develop an automatic mechanism
to detect the business process gap between the IS process ow and the
internal control ow. The mechanism should be automatic in order to
support continuous auditing [24,40,41]. The audit object of the automatic
mechanism is the business process compliance test, and the audit
evidence the automatic mechanism needs includes the IS process ow
and internal control ow. The automatic mechanism has three phases:
Phase1: Identifying the internal control ow for audit object.
Phase2: Identifying the IS process ow for audit object.
Phase3: Business process gap analysis.
439
440
441
442
443
444
DR = DRttDRtbDRbb, where:
DRtt = {(ci,cj)|(PKRs)(ci)p(FKRs)(cj), if Rs(ci)2 RtRs(cj)2Rt}
DRtb = {(ci,cj)|(FKRs)(ci)t(PKRs)(cj), if Rs(ci)2 RtRs(cj)2Rb}
DRbb = {(ci,cj)|(PKRs)(ci)p(FKRs)(cj), if Rs(ci)2 RbRs(cj)2Rb}
where:
Rs (c) is the function which maps command c's resource.
PK (r) is the function which maps resources r's primary keys.
FK (r) is the function which maps resources r's foreign keys.
The two resources basic resource Rb and transaction resource Rt
break down Resource Dependence into three different relationships:
DRtt, DRtb, and DRbb. DRtt is the Resource Dependence of two
transaction resources, DRtb is the Resource Dependence of the
transaction resource and basic resource, and DRbb is the Resource
Dependence of two basic resources.
It is easy to understand Resource Dependence when thinking about
the character of primary keys and foreign keys of each entity in the
Entity Relationship Model (ER Model). In the ER Model, there exists a
relationship between two entities if one entity's foreign keys are
referenced from the other's primary keys [48]. Therefore, in a database
log, there exists Resource Dependence between two DML commands if
the two resources involved in the commands have a relationship.
where:
V(k) is the function which maps key k's value in database log.
445
Denition 8. (Operations): Let O be the set of the operations processed by functions in each task, where OpTpL.
Table 4
Database log for the sales-to-delivery cycle of SAP R/3 SD.
ID
Operation
Table
PK
Value
C1
C2
UPDATE
INSERT
MARA
VBAK
C3
INSERT
VBAP
MATNR
VBELN
VBELN
POSNR
FERT001
7394
7394
01
C4
C5
C6
C7
C8
C9
C10
C11
C12
C13
INSERT
INSERT
INSERT
INSERT
INSERT
UPDATE
INSERT
INSERT
INSERT
INSERT
VBAP
VBAK
VBAP
LIKP
LIPS
VBAK
VBAP
LIKP
LIPS
LIPS
VBELN
POSNR
VBELN
VBELN
POSNR
VBELN
VBELN
POSNR
VBELN
VBELN
POSNR
VBELN
VBELN
POSNR
VBELN
POSNR
7394
02
9501
9501
01
800311
800311
01
9501
9501
01
800312
800312
01
800312
02
FK
Value
Transaction ID
0000:000f331
0000:000f332
VBAK.VBELN
7394
MARA.MATNR
VBAK.VBELN
FERT001
7394
MARA.MATNR
FERT002
VBAK.VBELN
9501
MARA.MATNR
FERT001
LIKP.VBELN
800311
VBAP.VBELN
VBAP.POSNR
9501
01
VBAK.VBELN
9501
MARA.MATNR
FERT001
LIKP.VBELN
800312
VBAP.VBELN
VBAP.POSNR
LIKP.VBELN
7394
01
800312
VBAP.VBELN
VBAP.POSNR
7394
02
0000:000f332
0000:000f3332
0000:000f3333
0000:000f3333
0000:000f3334
0000:000f3334
0000:000f3335
0000:000f3335
0000:000f3336
0000:000f3336
0000:000f3336
446
d
P
"
Uk =
1
1
I11
M1 I11
I12 K
#
, where K = [K1,,Ki r]T.
d
P
Uk .
d
P
Uk = U1 ; N ; Ud is the sum
ring sequence
447
4. Mechanism development
This research constructs a Business Process Gap Detecting Mechanism (BPGAP-Detecting Mechanism) system to implement the business
process gap detection. The BPGAP-Detecting Mechanism system is
developed based on the environment of Microsoft .NET and the
Microsoft SQL Server. This study separates functions of the BPGAPDetecting Mechanism system into six fundamental libraries such as
abstraction, encapsulation, polymorphism, and inheritance of the
object-oriented model to take advantage of the inherent strengths.
Therefore, the eEPC can be replaced by other dynamic modeling tools,
such as UML (Unied Modeling Language), without rewriting the
algorithm of the gap detecting mechanism.
In addition to the six libraries of the BPGAP-Detecting Mechanism
system, this study employed the third party software Lumigent Log
Explorer [32] to provide the assistance in extracting the database log.
This study requires the use of Lumigent Log Explorer because Microsoft
SQL Server does not provide any open protocol to access its database log.
The log explorer software can be used to read and export the database
0; 0; 1; 1; 1; 0; 0; 0; 0; 0; 1; 0; 0; 0; 0; 0; 0 K1 = 0 and K2 = 0 is revealed
to be a nonnegative integer and reable solution. Therefore, the IS
Table 5
The adjusted transpose incidence matrix of the adjusted Petri-Net.
PLACES/TRANSITIONS
CREATE SALES ORDER
CHANGE SALES ORDER
CREATED DELIVERY
INSERT VBAK
INSERT VBAP
UPDATE VBAK
UPDATE VBAP
INSERT LIKP
INSERT LIPS
VBAK
VBAP
LIKP
LIPS
XOR_1
XOR_2
A1
1
0
0
1
1
0
0
0
0
0
0
0
0
1
0
A2
0
1
0
0
0
1
1
0
0
1
1
0
0
0
1
A3
0
0
1
0
0
0
0
1
1
0
0
0
0
0
0
A4
0
0
0
2
0
0
0
0
0
1
0
0
0
0
0
A5
0
0
0
0
2
0
0
0
0
0
1
0
0
0
0
A6
0
0
0
0
0
2
0
0
0
1
0
0
0
0
0
A7
0
0
0
0
0
0
2
0
0
0
1
0
0
0
0
A8
0
0
0
0
0
0
0
2
0
0
0
1
0
0
0
A9
0
0
0
0
0
0
0
0
2
0
0
0
1
0
0
A10
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
A11
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
A12
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
A14
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
A16
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
A17
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
A13
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
A15
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
Note
A1:
A2:
A3:
A4:
A5:
A6:
A13: XOR_2_2
A14: VBAK_UNCONCERNED
A15: VBAP_UNCONCERNED
A16: LIKP_UNCONCERNED
A17: LIPS_UNCONCERNED
448
Table 6
The transpose incidence matrix of the adjusted Petri-Net.
The transpose Incidence Matrix of the modied Petri Net
PLACES\TRANSITIONS
A1
A2
A3
A4
A5
A6
A7
A8
A9
A10
A11
A12
A13
A14
A15
A16
A17
A18
A19
A20
A21
A22
A23
A24
A25
A26
A27
A28
A29
A30
A31
A32
A33
A34
A35
A36
A37
A38
A39
0
0
0
0
0
0
0
0
2
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
2
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
2
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
2
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
2
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
2
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
2
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
2
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
2
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
2
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
2
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
Note
A1: NEW SALES ORDER
A2: MODIFY SALES ORDER
A3: NEW DELIVERY
A4: MODIFY DELIVERY
A5: NEW BILLING DOC.
A6: MODIFY BILLING DOC.
A25: XOR_2_2
A26: XOR_3_1
A27: XOR_3_2
A28: XOR_4_1
A29: XOR_4_2
A30: XOR_5_1
A31: XOR_5_2
A32: XOR_6_1
A33: XOR_6_2
A34: VBAK_UNCONCERNED
A35: VBAP_UNCONCERNED
A36: LIKP_UNCONCERNED
A37: LIPS_UNCONCERNED
A38: VBRK_UNCONCERNED
A39: VBRP_UNCONCERNED
CREATE SALES
1
0
0
0
0
0
0
0
0
0
ORDER
CHANGE SALES
0 1
0
0
0
0
0
0
0
0
ORDER
CREATE DELIVERY
0
0 1
0
0
0
0
0
0
0
CHANGE DELIVERY
0
0
0 1
0
0
0
0
0
0
CREATE BILLING DOC.
0
0
0
0 1
0
0
0
0
0
CHANGE BILLING DOC. 0
0
0
0
0 1
0
0
0
0
CANCEL BILLING DOC. 0
0
0
0
0
0 1
0
0
0
INSERT VBAK
1
0
0
0
0
0
0 2
0
0
INSERT VBAP
1
0
0
0
0
0
0
0 2
0
UPDATE VBAK
0
1
0
0
0
0
0
0
0 2
UPDATE VBAP
0
1
0
0
0
0
0
0
0
0
INSERT LIKP
0
0
1
0
0
0
0
0
0
0
INSERT LIPS
0
0
1
0
0
0
0
0
0
0
UPDATE LIKP
0
0
0
1
0
0
0
0
0
0
UPDATE LIPS
0
0
0
1
0
0
0
0
0
0
INSERT VBRK
0
0
0
0
1
0
0
0
0
0
INSERT VBRP
0
0
0
0
1
0
0
0
0
0
UPDATE VBRK
0
0
0
0
0
1
0
0
0
0
UPDATE VBRP
0
0
0
0
0
1
0
0
0
0
DELETE VBRK
0
0
0
0
0
0
1
0
0
0
DELETE VBRP
0
0
0
0
0
0
1
0
0
0
VBAK
0 1
0
0
0
0
0
1
0
1
VBAP
0 1
0
0
0
0
0
0
1
0
LIKP
0
0
0 1
0
0
0
0
0
0
LIPS
0
0
0 1
0
0
0
0
0
0
VBRK
0
0
0
0
0 1 1
0
0
0
VBRP
0
0
0
0
0 1 1
0
0
0
XOR_1
1
0
0
0
0
0
0
0
0
0
XOR_2
0
1
0
0
0
0
0
0
0
0
XOR_3
0
0
1
0
0
0
0
0
0
0
XOR_4
0
0
0
1
0
0
0
0
0
0
XOR_5
0
0
0
0
1
0
0
0
0
0
XOR_6
0
0
0
0
0
1
0
0
0
0
Table 7
The adjusted transpose incidence matrix of the adjusted Petri-Net.
The adjusting transpose Incidence Matrix of the modied Petri Net
PLACES\TRANSITIONS
A1
A2
A3
A4
A5
A6
A7
A8
A9
A10
A11
A12
A13
A14
A15
A16
A17
A18
A19
A20
A21
A22
A23
A24
A26
A27
A28
A30
A31
A32
A34
A36
A38
A25
A29
A33
A35
A37
A39
0
0
0
0
0
0
0
0
2
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
2
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
2
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
2
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
2
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
2
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
2
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
2
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
2
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
2
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
2
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
CREATE SALES
1
0
0
0
0
0
0
0
0
0
ORDER
CHANGE SALES
0 1
0
0
0
0
0
0
0
0
ORDER
CREATE DELIVERY
0
0 1
0
0
0
0
0
0
0
CHANGE DELIVERY
0
0
0 1
0
0
0
0
0
0
CREATE BILLING DOC. 0
0
0
0 1
0
0
0
0
0
CHANGE BILLING DOC. 0
0
0
0
0 1
0
0
0
0
CANCEL BILLING DOC. 0
0
0
0
0
0 1
0
0
0
INSERT VBAK
1
0
0
0
0
0
0 2
0
0
INSERT VBAP
1
0
0
0
0
0
0
0 2
0
UPDATE VBAK
0
1
0
0
0
0
0
0
0 2
UPDATE VBAP
0
1
0
0
0
0
0
0
0
0
INSERT LIKP
0
0
1
0
0
0
0
0
0
0
INSERT LIPS
0
0
1
0
0
0
0
0
0
0
UPDATE LIKP
0
0
0
1
0
0
0
0
0
0
UPDATE LIPS
0
0
0
1
0
0
0
0
0
0
INSERT VBRK
0
0
0
0
1
0
0
0
0
0
INSERT VBRP
0
0
0
0
1
0
0
0
0
0
UPDATE VBRK
0
0
0
0
0
1
0
0
0
0
UPDATE VBRP
0
0
0
0
0
1
0
0
0
0
DELETE VBRK
0
0
0
0
0
0
1
0
0
0
DELETE VBRP
0
0
0
0
0
0
1
0
0
0
VBAK
0 1
0
0
0
0
0
1
0
1
0
0
0
0
0
0
1
0
VBAP
0 1
LIKP
0
0
0 1
0
0
0
0
0
0
LIPS
0
0
0 1
0
0
0
0
0
0
VBRK
0
0
0
0
0 1 1
0
0
0
VBRP
0
0
0
0
0 1 1
0
0
0
XOR_1
1
0
0
0
0
0
0
0
0
0
XOR_2
0
1
0
0
0
0
0
0
0
0
XOR_3
0
0
1
0
0
0
0
0
0
0
XOR_4
0
0
0
1
0
0
0
0
0
0
XOR_5
0
0
0
0
1
0
0
0
0
0
XOR_6
0
0
0
0
0
1
0
0
0
0
Note
A1: NEW SALES ORDER
A2: MODIFY SALES ORDER
A3: NEW DELIVERY
A4: MODIFY DELIVERY
A5: NEW BILLING DOC.
A6: MODIFY BILLING DOC.
A25: XOR_2_2
A26: XOR_3_1
A27: XOR_3_2
A28: XOR_4_1
A29: XOR_4_2
A30: XOR_5_1
A31: XOR_5_2
A32: XOR_6_1
A33: XOR_6_2
A34: VBAK_UNCONCERNED
A35: VBAP_UNCONCERNED
A36: LIKP_UNCONCERNED
A37: LIPS_UNCONCERNED
A38: VBRK_UNCONCERNED
A39: VBRP_UNCONCERNED
449
450
451
5.3. The substantive test by using the Generalized Audit Software (GAS)
First, this paper extracts the data of the ORD module between 2006/
012006/02 for analysis. The Generalized Audit Software (GAS) ACL is
used to nd the items lost within sales orders when purchase orders
were transferred from sales orders. This paper found that there were 132
lost items distributed on 54 sales orders in this month. The total duration
of the test was about one hour.
This study group proposed the substantive result to K Company
and met to communicate the result. Four sales department users who
were involved in the ORD module attended the meeting, which lasted
approximately one hour. This study summarizes some crucial points
from the dialogue between IT auditors and users in the following:
1. Every item in the purchase orders should have a mapping item in
the sales orders.
2. Account control of the ERP system is satisfactory, as other
departments lack permission to modify the sales order. Therefore,
the data quality problem should be traced to the sales department.
3. The ERP system does not show any error message about the data
quality problem.
4. There is no pattern of the data quality problem.
5. Users did not delete any item of the sales orders during our sample
date.
5.4. The control test by using the BPGAP-detecting mechanism system
It is easy to nd data quality problems via the substantive test of
Generalized Audit Software (GAS). However, for deeper analysis to
know how the data quality problem happened, this study utilized
the control test of the BPGAP-Detecting Mechanism system.
First, the BPGAP-Detecting Mechanism system is used to depict
the internal control ow of the ORD module. The ERP vendor
documents the internal control ow of the ORD module. The ERP
vendor then uses the eEPC diagram to depict their systems, from
which the eEPC diagram of the internal control ow can be easily
attained. Because the BPGAP-Detecting Mechanism system also
contains the notations of the eEPC, it is easy for us to depict the eEPC
diagram in the BPGAP-Detecting Mechanism system. Second, the
workow and dataow models can be mapped to the mathematical
model Petri-Net. Third, the Lumigent Log Explorer software is used
to assist us in extracting the database log of the ORD module. Since
the total log of the ORD module is very large, this paper only extracts
INSERT, UPDATE and DELETE commands between 2006/01/01 ~
2006/01/31 of the log. After exporting the log to the database, the
stored procedure of the Resource and Value Dependence Method
was performed. The nal step is to conduct a business process gap
analysis. The reachability analysis of Petri-Net will calculate all
possible paths according to the database log and test the correctness
of the paths. After performing the business process gap analysis,
statistical results can be depicted with a pie chart. It is intriguing that
98 (9.4%) IS process ows are erroneous out of 1048 (100%) total IS
process ows. Four IS process ows violate the internal control ows
and they are:
1. Pass sales to PO (Purchase Order) modify sales order. (51)
2. Modify sales order new stock quantity. (44)
Fig. 10. Scenario detected after the control test of the data quality problem.
452
database log can improve the quality of the business process gap
detecting mechanism.
This study illustrates not only the importance of meta-data such as
transaction log for auditing, but also that the some of the DBMS logs
are insufcient as audit evidence. Thus, we are suggesting that
alterative theories of IS and auditing may be needed to address
important internal control and audit issues.
Acknowledgments
The work presented in this paper has been supported by The
National Science Council, Taiwan, R.O.C, under Grant No. 97-2410-H194-074-MY3. The authors of this research appreciate deeply their
nancial support and encouragement. In addition, the authors wish to
thank Dr. Hartmut Juergen Will for his advice for improvement.
References
[1] W.M.P. van der Aalst, Formalization and verication of event-driven process
chains, Information and Software Technology 41 (10) (1999) 639650.
[2] W.M.P. van der Aalst, Matching observed behavior and modeled behavior: an
approach based on Petri nets and integer programming, Decision Support Systems
42 (3) (2006) 18431859.
[3] W.M.P. van der Aalst, H.A. Reijers, A.J.M.M. Weijters, B.F. van Dongen, A.K. Alves de
Medeiros, M. Song, H.M.W. Verbeek, Business process mining: an industrial
application, Information Systems 32 (5) (2007) 713732.
[4] M. Alavi, P. Carlson, A review of MIS research and disciplinary development,
Journal of Management Information Systems 8 (4) (1992) 4562.
[5] M. Alles, G. Brennan, A. Kogan, M.A. Vasarhelyi, Continuous monitoring of business
process controls: a pilot implementation of a continuous auditing system at
Siemens, International Journal of Accounting Information Systems 7 (2) (2006)
137161.
[6] T. Andrews, F. Curbera, H. Dholakia, Y. Goland, J. Klein, F. Leymann, K. Liu, D. Roller,
D. Smith, S. Thatte, I. Trickovic, S. Weerawarana, Business Process Execution
Language for Web Services, 2003 http://ifr.sap.com/bpel4ws.
[7] C. Badica, A. Badica, V. Litoiu, A new formal IDEF-based modelling of business
processes, Proceedings of the First Balkan Conference in Informatics, 2003.
[8] A.D. Bailey, G.L. Duke, J. Gerlach, C. Ko, R.D. Meservy, A.B. Whinston, TICOM and the
analysis of internal controls, The Accounting Review LX (2) (1985) 186201.
[9] H.G. Baker, Petri nets and languages, Computation Structures Group Memo 68,
(Project MAC, MIT, Cambridge, Mass., 1972).
[10] G. Booch, J. Rumbaugh, I. Jacobson, The Unied Software Development Process,
Addison-Wesley, 1999.
[11] R.L. Braun, H.E. Davis, Computer-assisted audit tools and techniques: analysis and
perspectives, Managerial Auditing Journal 18 (9) (2003) 725731.
[12] J.W. Bryans, M. Koutny, P.Y.A. Ryan, Modeling Opacity Using Petri-Nets, Electronic
Notes in Theoretical Computer Science, vol. 121, 2005, pp. 101115.
[13] J.J. Champlain, Auditing Information Systems 2nd, John Wiley & Sons, 2003.
[14] S. Chan, SarbanesOxley: the IT dimension, The Internal Auditor 61 (1) (2004)
3133.
[15] C.L.Y. Chou, T. Du, V.S. Lai, Continuous auditing with a multi-agent system, Decision
Support Systems 42 (4) (2007) 22742292.
[16] J.A. Christensen, J.R. Byington, The computer: an essential fraud detection tool,
Journal of Corporate Accounting & Finance 14 (5) (2003) 2327.
[17] Computer Security Institute (CSI) and San Francisco Federal Bureau of Investigation's (FBI) Computer Intrusion Squad, 2005 Computer Crime and Security Survey,
2005 http://www.GoCSI.com.
[18] R.J. Daigle, T. Kizirian, L.D. Sneathen Jr., System controls reliability and assessment
effort, International Journal of Auditing 9 (1) (2005) 7990.
[19] S.V. Grabski, S.A. Leech, Complementary controls and ERP implementation success,
International Journal of Accounting Information Systems 8 (1) (2007) 1739.
[20] S.M. Groomer, U.S. Murthy, Continuous auditing of database applications: an
embedded audit module approach, Journal of Information Systems 3 (2) (1989) 5369.
[21] J.H. Harrington, E.K.C. Esseling, H. van Nimwegen, Business process improvement
workbook: documatation, analysis, design, and management of business process
improvement, McGrawHill, New York, 1998.
[22] A.R. Hevner, S.T. March, P. Jinsoo, S. Ram, Design science in information systems
research, MIS Quarterly 28 (1) (2004) 75106.
[23] T. Hoffman, SarbanesOxley sparks forensics apps interest: vendors offer
monitoring tools to help identify incidents of nancial fraud, Computer World
38 (2004).
[24] ISACA Standards Board, Continuous auditing: is it fantasy or reality? Information
System Control Journal 5 (2002) 4346.
[25] Y.C. Juan, C.O. Yang, Systematic approach for the gap analysis of business processes,
International Journal of Production Research 42 (7) (2004) 13251364.
[26] G. Keller, T. Teufel, SAP R/3 Process Oriented Implementation, Addison-Wesley,
1998.
[27] C.H. Kim, D.S. Yim, R.H. Weston, An integrated use of IDEF0, IDEF3 and Petri-Net
methods in support of business process modeling, Journal of Process Mechanical
Engineering 215 (4) (2001) 317329.
453
[28] I. Koch, B.H. Junker, M. Heiner, Application of Petri-Net for modeling and validation
of the sucrose breakdown pathway in the potato tuber, Bioinformatics 21 (7)
(2005) 12191226.
[29] P.T. Lee, K.P. Tan, Modeling of visualised data-ow diagrams using Petri net model,
Software Engineering Journal 7 (1) (1992) 412.
[30] K. Lee, H. Jeong, C. Park, J. Park, Construction and performance analysis of a PetriNet model based on a functional model in a CIM system, International Journal of
Advanced Manufacturing Technology 23 (12) (2004) 139147.
[31] R. Liu, A. Kumar, W. van der Aalst, A formal modeling approach for supply chain
event management, Decision Support Systems 43 (3) (2007) 761778.
[32] Lumigent.com, http://www.lumigent.com/ (2005).
[33] H.K. Meena, I. Saha, J.K. Mondal, T.V. Prabhakar, An approach to workow
modeling and analysis, Proceedings of the Institution of Mechanical Engineers
Part E Journal of Process Mechanical Engineering 215 (4) (2001) 317329.
[34] R.D. Meservy, A.D. Bailey, P.E. Johnson, Internal control evaluation: a computational model of the review process, Auditing: A Journal of Practice & Theory 6 (1)
(1986) 4474.
[35] Microsoft.com, MSDN: Introduction to Transaction Logs, 2005 http://msdn2.
microsoft.com/en-us/library/ms190925.aspx.
[36] J.L. Mooney, H.W. Harrell, S.E. Ludwig, Audit software that helps your company
stop fraud, Journal of Corporate Accounting & Finance 11 (4) (2000) 1723.
[37] T. Murata, Petri-Nets: properties, analysis and applications, Proceedings of the
IEEE 77 (4) (1989) 541580.
[38] Oracle.com, Oracle Database Concepts 10g Release 2 (10.2) B14220-02, 2005
http://download-west.oracle.com/docs/cd/B19306_01/server.102/b14220/toc.htm.
[39] M. Petterson, The keys to effective IT auditing, Journal of Corporate Accounting &
Finance 16 (5) (2005) 4146.
[40] Z. Rezaee, R. Elam, A. Sharbatoghlie, Continuous auditing: the audit of the future,
Managerial Auditing Journal 16 (3) (2001) 150158.
[41] Z. Rezaee, A. Sharbatoghlie, R. Elam, P.L. McMickle, Continuous auditing: building
automated auditing capability, Auditing 21 (1) (2002) 147163.
[42] P. Rob, C. Coronel, Database Systems: Design, Implementation, and Management
6th, Course-Technology, 2004.
[43] M.B. Romney, P.J. Steinbart, Accounting Information Systems 10th, Prentice Hall, 2005.
[44] P. Sarbanes, G. Oxley, SarbanesOxley act of 2002, , 2002.
[45] T. Schattkowsky, UML 2.0 overview and perspectives in SoC design, Proceedings of the
Design, Automation and Test in Europe Conference and Exhibition, 2005, pp. 823833.
[46] A.W. Scheer, Aris - Modellierungsmethoden, Metamodelle, Anwendungen,
Spinger, 2001.
[47] O. Turetke, D. Schuff, R. Sharda, T.T. Ow, Supporting systems analysis and design
through sheye views, Communications of The ACM 47 (9) (2004) 7277.
[48] J.D. Ullman, J.D. Widom, A First Course In Database Systems 2nd, Prentice Hall, 2002.
[49] S.A. White, Business Process Modeling Notation (BPMN) Version 1.0, 2004 http://
BPMI.org.
[50] Wikipedia, Petri net, 2009 http://en.wikipedia.org/wiki/Petri_net.
[51] G.C. Williams, Implementing SAP Sales and Distribution, McGraw Hill, New York,
2000.
[52] J.L. Witten, L.D. Bentley, K.C. Dittman, System Analysis & Design Methods 7th,
McGrawHill, 2005.
[53] S. Wright, A.M. Wright, Information system assurance for enterprise resource
planning systems: unique risk considerations, Journal of Information Systems 16
(1) (2002) 99113.
[54] A.W.L. Yao, H.T. Liao, J.S.C. Chi, S.S. Peng, A Petri-Net based ofine simulation and
online diagnostic platform for manufacturing systems, Journal of Chinese Institute
of Industrial Engineers 22 (1) (2005) 6475.
[55] R.K. Yin, Case Study Research: Design and Methods 3rd, Sage Publications, 2003.
[56] Y.C. Yu, W.H. Chen, K.P. Liu, Integration of EPC and a modularized colored Petri-Net
through events for agile manufacturing cell control, Proceedings of the 2004 IEEE
International Conference on Networking, Sensing & Control, 2004.
[57] American Institute of Certied Public Accountants, Amendment to Statement on
Auditing Standards No. 31, Evidential Matter, Statement on Auditing Standards, No.
80, New York: AICPA (1996).
[58] C.A. Petri, Communication with Automata, Grifss Air Force Base Tech, Report
RADC-TR-65377 1 (1) (1966).
Shi-Ming Huang received his PhD degree at the School of Computing and Information
Systems, University of Sunderland, U.K. He is currently a Professor of Information
Management Department and a Director for the Center of Manufacturing and Commerce
Automation at National Chung Cheng University, Taiwan. Before joining the university faculty,
he was a head and associate professor at the Department of Information Management, Tatung
University, Taiwan. He was also a director of the center for commerce automation at the north
region Taiwan for Ministry of Education, Taiwan. He has published several books and papers
in the elds of information systems and has acted as a consultant for a variety of Taiwan
government departments, software companies and commercial companies.
David C. Yen is currently Jennifer E. Petters Chair in Asia Business and Professors of MIS of the
Department of Decision Sciences and Management Information Systems at Miami University.
He assumed Raymond E. Glos Professor in Business from 20052007 and was a department
chair from 19952005. After receiving his PhD in MIS and MS in Computer Sciences in 1985,
professor Yen is active in research. He has published books and articles which have appeared
in Communications of the ACM, Decision Support Systems, Information & Management,
Information Sciences, Computer Standards and Interfaces, Information Society, Omega,
International Journal of Organizational Computing and Electronic Commerce, and Communications of AIS among others. Professor Yen's research interests include data communications, electronic/mobile commerce, and systems analysis and design.
454
Jing-Shiuan Hua is currently pursuing her PhD in MIS in the Department of Information
Management from the National Chung-Cheng University. She was a member of National
Chung-Cheng University Center for e-Manufacturing and e-Commerce. Ms. Hua
research interest includes data base, web design, and systems analysis and design.