30,688 research outputs found

    Implications to the Audit Process of Auditing that uses Data Analytics Tools and New Business Models

    Get PDF
    Paper II is excluded from the dissertation until it is published.New advances in information technology have created a wave of technological innovations which affect the audit firms. Audit firms are now investing large sums of money to acquire and adopt data analytics tools. Using three studies in this dissertation, I investigated questions relating to the impact of digital tools in the audit process. These studies are briefly summarized below. The first study investigates whether the audit evidence from a process mining tool provides information that adds to the appropriateness (relevance) of the audit evidence collected by traditional analytical procedures. The results shows that auditors do perceive evidence from a process mining tool to express information that is relevant for both the planning and substantive stages of the audit even though the auditor’s risk assessment was higher in the substantive stage as compared to the planning stage. In addition, the results also shows that there was no difference in the auditor’s assessment of the relevance of the information presented in graph format and in written text format as both are considered equally relevant in the planning and substantive stages. The second study investigates the unintended consequences in auditor’s decision making of using digital tools with powerful visualization abilities in the audit process. Specifically, the study investigates whether auditors make their decisions based on the relevance of the information to the decision to be made when using both visual audit evidence and text evidence or their decision will be based on a bias. The results shows that when auditors are presented with different information presented in different formats (visual or text), they are most likely to use the piece of information presented in visual rather than using the piece of audit evidence which is relevant to the decision. The third paper analyses the fraud case of a financial technology company Wirecard using the fraud triangle as the theoretical framework. The results shows that of the three factors identified in the fraud triangle, opportunity was the most prevalent factor and rationalization was least observable.publishedVersio

    Diversification, innovation, and imitation inside the Global Technological Frontier

    Get PDF
    Recent research highlights the relationship between economic development and productive diversification, which may be hindered by market failures. After identifying stages of diversification in disaggregated export data, the authors develop a metric for the flows of export"discoveries,"or inside-the-frontier innovations in developing countries. They then explore the empirical relationship between economic development and (1) inside-the-frontier-innovation as reflected by the introduction of new export products, (2) export diversification measured by an index of export-revenue concentration, and (3) on-the-frontier innovation as reflected in patents. The data suggest, unsurprisingly, that inside-the-frontier innovation is more common among poor countries than among industrial economies. Overall export diversification increases at low levels of development but declines with development after a high-income point, whereas patenting activity rises exponentially with development. The data also suggest that the relationship between the frequency of export discoveries and economic development is not due to changes in the industrial composition of exports. The authors use a simple model of innovation and imitation to test the hypothesis that the threat of imitation inhibits the discovery of new exports. Econometric evidence suggests that the frequency of export discoveries across countries rises with the returns of export activities (proxied by exogenous export growth during the sample period), but the magnitude of this effect increases with barriers to entry. The count-data estimations deal with unobserved international heterogeneity, and the results are robust to various changes in the specification of the empirical model. This finding supports the hypothesisthat market failures inhibit inside-the-frontier innovation.Economic Theory&Research,Markets and Market Access,Water Resources Assessment,Achieving Shared Growth,Airports and Air Services

    The Impacts of "Shock Therapy" on Large and Small Clients: Experiences from Two Large Bank Failures in Japan

    Get PDF
    A "shock therapy" might have different impacts between large and small firms. In this paper, we focus on the clients of two large failed Japanese banks - the Long-term Credit Bank of Japan (LTCB) and the Nippon Credit Bank (NCB). We first show that subsequent events after the bank failures allowed the new LTCB to adopt a "shock therapy" but kept the new NCB to face "soft budget constraints". We then show that the different therapies made performances of these two banks' customers very different. Under the shock therapy, large firms showed significant recovery of their profits but small firms did not. In contrast, under the soft budget constraints, large firms did not show recovery and small firms experienced significant decline in their profits when the new bank terminated the banking relationship.bank failure, shock therapy, soft budget constraints, banking relationship

    Losing the War Against Dirty Money: Rethinking Global Standards on Preventing Money Laundering and Terrorism Financing

    Get PDF
    Following a brief overview in Part I.A of the overall system to prevent money laundering, Part I.B describes the role of the private sector, which is to identify customers, create a profile of their legitimate activities, keep detailed records of clients and their transactions, monitor their transactions to see if they conform to their profile, examine further any unusual transactions, and report to the government any suspicious transactions. Part I.C continues the description of the preventive measures system by describing the government\u27s role, which is to assist the private sector in identifying suspicious transactions, ensure compliance with the preventive measures requirements, and analyze suspicious transaction reports to determine those that should be investigated. Parts I.D and I.E examine the effectiveness of this system. Part I.D discusses successes and failures in the private sector\u27s role. Borrowing from theory concerning the effectiveness of private sector unfunded mandates, this Part reviews why many aspects of the system are failing, focusing on the subjectivity of the mandate, the disincentives to comply, and the lack of comprehensive data on client identification and transactions. It notes that the system includes an inherent contradiction: the public sector is tasked with informing the private sector how best to detect launderers and terrorists, but to do so could act as a road map on how to avoid detection should such information fall into the wrong hands. Part I.D discusses how financial institutions do not and cannot use scientifically tested statistical means to determine if a particular client or set of transactions is more likely than others to indicate criminal activity. Part I.D then turns to a discussion of a few issues regarding the impact the system has but that are not related to effectiveness, followed by a summary and analysis of how flaws might be addressed. Part I.E continues by discussing the successes and failures in the public sector\u27s role. It reviews why the system is failing, focusing on the lack of assistance to the private sector in and the lack of necessary data on client identification and transactions. It also discusses how financial intelligence units, like financial institutions, do not and cannot use scientifically tested statistical means to determine probabilities of criminal activity. Part I concludes with a summary and analysis tying both private and public roles together. Part II then turns to a review of certain current techniques for selecting income tax returns for audit. After an overview of the system, Part II first discusses the limited role of the private sector in providing tax administrators with information, comparing this to the far greater role the private sector plays in implementing preventive measures. Next, this Part turns to consider how tax administrators, particularly the U.S. Internal Revenue Service, select taxpayers for audit, comparing this to the role of both the private and public sectors in implementing preventive measures. It focuses on how some tax administrations use scientifically tested statistical means to determine probabilities of tax evasion. Part II then suggests how flaws in both private and public roles of implementing money laundering and terrorism financing preventive measures might be theoretically addressed by borrowing from the experience of tax administration. Part II concludes with a short summary and analysis that relates these conclusions to the preventive measures system. Referring to the analyses in Parts I and II, Part III suggests changes to the current preventive measures standard. It suggests that financial intelligence units should be uniquely tasked with analyzing and selecting clients and transactions for further investigation for money laundering and terrorism financing. The private sector\u27s role should be restricted to identifying customers, creating an initial profile of their legitimate activities, and reporting such information and all client transactions to financial intelligence units

    The Corporate Purpose of Social License

    Get PDF
    This Article deploys the sociological theory of social license, or the acceptance of a business or organization by the relevant communities and stakeholders, in the context of the board of directors and corporate governance. Corporations are generally treated as “private” actors and thus are regulated by “private” corporate law. This construct allows for considerable latitude. Corporate actors are not, however, solely “private.” They are the beneficiaries of economic and political power, and the decisions they make have impacts that extend well beyond the boundaries of the entities they represent. Using Wells Fargo and Uber as case studies, this Article explores how the failure to account for the public nature of corporate actions, regardless of whether a “legal” license exists, can result in the loss of “social” license. This loss occurs through publicness, which is the interplay between inside corporate governance players and outside actors who report on, recapitulate, reframe and, in some cases, control the company’s information and public perception. The theory of social license is that businesses and other entities exist with permission from the communities in which they are located, as well as permission from the greater community and outside stakeholders. In this sense, businesses are social, not just economic, institutions and, thus, they are subject to public accountability and, at times, public control. Social license derives not from legally granted permission, but instead from the development of legitimacy, credibility, and trust within the relevant communities and stakeholders. It can prevent demonstrations, boycotts, shutdowns, negative publicity, and the increases in regulation that are a hallmark of publicness — but social license must be earned with consistent trustworthy behavior. Thus, social license is bilateral, not unilateral, and should be part of corporate strategy and a tool for risk management and managing publicness more generally. By focusing on and deploying social license and publicness in the context of board decision-making, this Article adds to the discussions in the literature from other disciplines, such as the economic theory on reputational capital, and provides boards with a set of standards with which to engage and address the publicness of the companies they represent. Discussing, weighing, and developing social license is not just in the zone of what boards can do, but is something they should do, making it a part of strategic, proactive cost-benefit decision-making. Indeed, the failure to do so can have dramatic business consequences

    Multilayer Networks

    Full text link
    In most natural and engineered systems, a set of entities interact with each other in complicated patterns that can encompass multiple types of relationships, change in time, and include other types of complications. Such systems include multiple subsystems and layers of connectivity, and it is important to take such "multilayer" features into account to try to improve our understanding of complex systems. Consequently, it is necessary to generalize "traditional" network theory by developing (and validating) a framework and associated tools to study multilayer systems in a comprehensive fashion. The origins of such efforts date back several decades and arose in multiple disciplines, and now the study of multilayer networks has become one of the most important directions in network science. In this paper, we discuss the history of multilayer networks (and related concepts) and review the exploding body of work on such networks. To unify the disparate terminology in the large body of recent work, we discuss a general framework for multilayer networks, construct a dictionary of terminology to relate the numerous existing concepts to each other, and provide a thorough discussion that compares, contrasts, and translates between related notions such as multilayer networks, multiplex networks, interdependent networks, networks of networks, and many others. We also survey and discuss existing data sets that can be represented as multilayer networks. We review attempts to generalize single-layer-network diagnostics to multilayer networks. We also discuss the rapidly expanding research on multilayer-network models and notions like community structure, connected components, tensor decompositions, and various types of dynamical processes on multilayer networks. We conclude with a summary and an outlook.Comment: Working paper; 59 pages, 8 figure

    Developing Adaptive Islamic Law Business Processes Models for Islamic Finance and Banking by Text Mining the Holy Quran and Hadith.

    Get PDF
    Global Islamic finance assets grew from 200billionto200 billion to 1.8 trillion (IMF 2015) and is growing faster than the conventional banking sector. A large number of conventional financial institutions, especially banks are moving to an Islamic financial model that\u27s comply with the Shari\u27a Law with little change to current conventional practices (reverse eningineer current business processes) to accommodate the new situation. In this study we will design and develop the business processes for the Islamic financial institutions\u27 (IFIs) products by investigating and collecting information through Islamic literature, surveys and interviews of experts in Islamic jurisprudence, regulators, academic and Islamic finance and banking practitioners. Then we will assess and evaluate the findings by using a Qur\u27anic Financial Corpus and use computational and analytical approaches to mine the Qur\u27an (the Muslim Holy book) and the Hadith (actions and words of the prophet Muhammad peace be upon him) to uncover hidden knowledge on Islamic financial business processes. The knowledge acquired from this investigation will be translated into an Islamic financial process model to be adapted by Islamic and non-Islamic financial institutions. The outcome of this research will influence the future development, growth and diversification of Islamic Financial Services worldwid
    corecore