34,263 research outputs found

    Testing Market Response to Auditor Change Filings: a comparison of machine learning classifiers

    Get PDF
    The use of textual information contained in company filings with the Securities Exchange Commission (SEC), including annual reports on Form 10-K, quarterly reports on Form 10-Q, and current reports on Form 8-K, has gained the increased attention of finance and accounting researchers. In this paper we use a set of machine learning methods to predict the market response to changes in a firm\u27s auditor as reported in public filings. We vectorize the text of 8-K filings to test whether the resulting feature matrix can explain the sign of the market response to the filing. Specifically, using classification algorithms and a sample consisting of the Item 4.01 text of 8-K documents, which provides information on changes in auditors of companies that are registered with the SEC, we predict the sign of the cumulative abnormal return (CAR) around 8-K filing dates. We report the correct classification performance and time efficiency of the classification algorithms. Our results show some improvement over the naĂŻve classification method

    Losing the War Against Dirty Money: Rethinking Global Standards on Preventing Money Laundering and Terrorism Financing

    Get PDF
    Following a brief overview in Part I.A of the overall system to prevent money laundering, Part I.B describes the role of the private sector, which is to identify customers, create a profile of their legitimate activities, keep detailed records of clients and their transactions, monitor their transactions to see if they conform to their profile, examine further any unusual transactions, and report to the government any suspicious transactions. Part I.C continues the description of the preventive measures system by describing the government\u27s role, which is to assist the private sector in identifying suspicious transactions, ensure compliance with the preventive measures requirements, and analyze suspicious transaction reports to determine those that should be investigated. Parts I.D and I.E examine the effectiveness of this system. Part I.D discusses successes and failures in the private sector\u27s role. Borrowing from theory concerning the effectiveness of private sector unfunded mandates, this Part reviews why many aspects of the system are failing, focusing on the subjectivity of the mandate, the disincentives to comply, and the lack of comprehensive data on client identification and transactions. It notes that the system includes an inherent contradiction: the public sector is tasked with informing the private sector how best to detect launderers and terrorists, but to do so could act as a road map on how to avoid detection should such information fall into the wrong hands. Part I.D discusses how financial institutions do not and cannot use scientifically tested statistical means to determine if a particular client or set of transactions is more likely than others to indicate criminal activity. Part I.D then turns to a discussion of a few issues regarding the impact the system has but that are not related to effectiveness, followed by a summary and analysis of how flaws might be addressed. Part I.E continues by discussing the successes and failures in the public sector\u27s role. It reviews why the system is failing, focusing on the lack of assistance to the private sector in and the lack of necessary data on client identification and transactions. It also discusses how financial intelligence units, like financial institutions, do not and cannot use scientifically tested statistical means to determine probabilities of criminal activity. Part I concludes with a summary and analysis tying both private and public roles together. Part II then turns to a review of certain current techniques for selecting income tax returns for audit. After an overview of the system, Part II first discusses the limited role of the private sector in providing tax administrators with information, comparing this to the far greater role the private sector plays in implementing preventive measures. Next, this Part turns to consider how tax administrators, particularly the U.S. Internal Revenue Service, select taxpayers for audit, comparing this to the role of both the private and public sectors in implementing preventive measures. It focuses on how some tax administrations use scientifically tested statistical means to determine probabilities of tax evasion. Part II then suggests how flaws in both private and public roles of implementing money laundering and terrorism financing preventive measures might be theoretically addressed by borrowing from the experience of tax administration. Part II concludes with a short summary and analysis that relates these conclusions to the preventive measures system. Referring to the analyses in Parts I and II, Part III suggests changes to the current preventive measures standard. It suggests that financial intelligence units should be uniquely tasked with analyzing and selecting clients and transactions for further investigation for money laundering and terrorism financing. The private sector\u27s role should be restricted to identifying customers, creating an initial profile of their legitimate activities, and reporting such information and all client transactions to financial intelligence units

    Implications to the Audit Process of Auditing that uses Data Analytics Tools and New Business Models

    Get PDF
    Paper II is excluded from the dissertation until it is published.New advances in information technology have created a wave of technological innovations which affect the audit firms. Audit firms are now investing large sums of money to acquire and adopt data analytics tools. Using three studies in this dissertation, I investigated questions relating to the impact of digital tools in the audit process. These studies are briefly summarized below. The first study investigates whether the audit evidence from a process mining tool provides information that adds to the appropriateness (relevance) of the audit evidence collected by traditional analytical procedures. The results shows that auditors do perceive evidence from a process mining tool to express information that is relevant for both the planning and substantive stages of the audit even though the auditor’s risk assessment was higher in the substantive stage as compared to the planning stage. In addition, the results also shows that there was no difference in the auditor’s assessment of the relevance of the information presented in graph format and in written text format as both are considered equally relevant in the planning and substantive stages. The second study investigates the unintended consequences in auditor’s decision making of using digital tools with powerful visualization abilities in the audit process. Specifically, the study investigates whether auditors make their decisions based on the relevance of the information to the decision to be made when using both visual audit evidence and text evidence or their decision will be based on a bias. The results shows that when auditors are presented with different information presented in different formats (visual or text), they are most likely to use the piece of information presented in visual rather than using the piece of audit evidence which is relevant to the decision. The third paper analyses the fraud case of a financial technology company Wirecard using the fraud triangle as the theoretical framework. The results shows that of the three factors identified in the fraud triangle, opportunity was the most prevalent factor and rationalization was least observable.publishedVersio

    Study on the Support Systems for Corporate Governance

    Get PDF
    The problems generated by the information asymmetry within the agency relationships at corporation level, governments and capital markets led to a higher necessity for corporate governance (CG). The information system of corporate governance is a very complex one, which involves a series of actors, decision-making and transactional processes, technologies, procedures and good practice codes. In order to ensure the efficiency and efficacy of corporate governance as a premise for increasing company’s performance and position consolidation for the company on the capital market, it is necessary to analyze the way information technology could contribute to this undertaking. The purpose of this study is to analyze the architecture of the corporate governance systems and to identify and classify the systems and technologies involved in ensuring CG support in order to underlie the basis for developing a conceptual model for a hybrid and collaborative support system for corporate governance.Corporate Governance, Support Systems, Information Technology, Decision-Making, Performance

    Does Canada Have a Problem with Occupational Fraud?

    Get PDF
    Small and medium-sized enterprises (SMEs) are an important collective force in the Canadian economy, however the visibility and economic power of small businesses suffer due to their size and frequent turnover. When it comes to the issue of businesses being subject to occupational fraud, the moderate visibility of SMEs only contributes to the challenge of assessing the real scope of the problem. This paper seeks to examine the prevalence and types of occupational fraud experienced by Canadian SMEs as well as gathers information on prevention and detection methods used to safeguard against occupational fraud. That is done based on data compiled from a survey of 802 SMEs across Canada. The analysis shows that a substantial proportion of SMEs experience incidents of occupational fraud; however, the majority of SMEs are not fully prepared to respond to fraud. Furthermore, SMEs’ experience with and attitudes toward fraud vary noticeably with company characteristics, although a large proportion of SMEs believe risk to occupational fraud is low.Occupational fraud, fraud prevention, fraud detection, types of occupational fraud, Canadian small and medium businesses, employee fraud, internal fraud
    • 

    corecore