152 research outputs found

    Representation of Interrelationships among Binary Variables under Dempster-Shafer Theory of Belief Functions

    Get PDF
    This is the peer reviewed version of the following article: Srivastava, R. P., L. Gao, and P. Gillett. " Representation of Interrelationships among Binary Variables under Dempster-Shafer Theory of Belief Functions" (pre-publication version), 2009, International Journal of Intelligent Systems, Volume 24 Issue 4, pp. 459 - 475, which has been published in final form at http://doi.org/10.1002/int.20347. This article may be used for non-commercial purposes in accordance with Wiley Terms and Conditions for Self-Archiving.This paper presents an algorithm for developing models under Dempster-Shafer theory of belief functions for categorical and 'uncertain' logical relationships among binary variables. We illustrate the use of the algorithm by developing belief-function representations of the following categorical relationships: 'AND', 'OR', 'Exclusive OR (EOR)' and 'Not Exclusive OR (NEOR)', and 'AND-NEOR' and of the following uncertain relationships: 'Discounted AND', 'Conditional OR', and 'Weighted Average'. Such representations are needed to fully model and analyze a problem with a network of interrelated variables under Dempster-Shafer theory of belief functions. In addition, we compare our belief-function representation of the 'Weighted Average' relationship with the 'Weighted Average' representation developed and used by Shenoy and Shenoy8. We find that Shenoy and Shenoy representation of the weighted average relationship is an approximation and yields significantly different values under certain conditions

    An Introduction to Evidential Reasoning for Decision Making under Uncertainty: Bayesian and Belief Functions Perspectives

    Get PDF
    The main purpose of this article is to introduce the evidential reasoning approach, a research methodology, for decision making under uncertainty. Bayesian framework and Dempster-Shafer theory of belief functions are used to model uncertainties in the decision problem. We first introduce the basics of the DS theory and then discuss the evidential reasoning approach and related concepts. Next, we demonstrate how specific decision models can be developed from the basic evidential diagrams under the two frameworks. It is interesting to note that it is quite efficient to develop Bayesian models of the decision problems using the evidential reasoning approach compared to using the ladder diagram approach as used in the auditing literature. In addition, we compare the decision models developed in this paper with similar models developed in the literature

    An Information Systems Security Risk Assessment Model Under Dempster- Schafer Theory of Belief Functions

    Get PDF
    This is the author's final draft. The publisher's official version is available from:.This study develops an alternative methodology for the risk analysis of information systems security (ISS), an evidential reasoning approach under the Dempster-Shafer theory of belief functions. The approach has the following important dimensions. First, the evidential reasoning approach provides a rigorous, structured manner to incorporate relevant ISS risk factors, related counter measures and their interrelationships when estimating ISS risk. Secondly, the methodology employs the belief function definition of risk, that is, ISS risk is the plausibility of information system security failures. The proposed approach has other appealing features, such as facilitating cost-benefit analyses to help promote efficient ISS risk management. The paper both elaborates the theoretical concepts and provides operational guidance for implementing the method. The method is illustrated using a hypothetical example from the perspective of management and a real-world example from the perspective of external assurance providers. Sensitivity analyses are performed to evaluate the impact of important parameters on the model’s results

    An Evidential Reasoning Approach to Sarbanes-Oxley Mandated Internal Control Risk Assessment

    Get PDF
    This is the peer reviewed version of the following article: Mock, T., L. Sun, R. P. Srivastava, and M. Vasarhelyi. " An Evidential Reasoning Approach to Sarbanes-Oxley Mandated Internal Control Risk Assessment under Dempster-Shafer Theory", 2009, ABACUS, Vol. 45, No. 1, pp. 66-87. , which has been published in final form at http://doi.org/10.1016/j.accinf.2008.10.003. This article may be used for non-commercial purposes in accordance with Wiley Terms and Conditions for Self-Archiving.In response to the enactment of the Sarbanes-Oxley Act 2002 and of the release of the Public Company Accounting Oversight Board (PCAOB) Auditing Standard No. 5, this study develops a risk-based evidential reasoning approach for assessing the effectiveness of internal controls over financial reporting (ICoFR). This approach provides a structured methodology for assessing the effectiveness of ICoFR by considering relevant factors and their interrelationships. The Dempster-Shafer theory of belief functions is utilized for representing risk. First, we develop a generic ICoFR assessment model based upon a Big 4 audit firm’s approach and apply it to a real-world example. Then, based on this model, we develop a quantitative representation of various levels of ICoFR effectiveness and related risk-assessment as defined by the PCAOB and contrast these representations with levels implied by Auditing Standard No. 5. In doing so, we demonstrate the potential value of formal risk assessment models in both facilitating the assessment of risks in an individual engagement and in assessing the effects of different regulations

    Bayesian and Belief-Functions Formulas for Auditor Independence Risk Assessment

    Get PDF
    This is the authors final draft. The publisher's official version is available electronically from: .This paper illustrates two formulas for assessing independence risk based on the Bayesian and belief-functions frameworks. These formulas can be used to assess the role of threats to auditor independence as well as the role of threat-mitigating safeguards. Also, these formulas provide a basis for evaluation of an audit firm’s independence risk and a framework to educate stakeholders about the threats faced by the audit firm and the role of effective safeguards in mitigating these risks. The formulas also provide a means for regulators and lawmakers to evaluate whether they have effective safeguards in place given the existence of threats and for auditors to signal to various stakeholders that they have identified significant threats and have effective safeguards in place. To show the potential usefulness of these analytical models, several illustrations addressing increased transparency and the potential impact of regulations are presented

    An Evidential Reasoning Approach to Fraud Risk Assessment under Dempster-Shafer Theory: A General Framework

    Get PDF
    This paper develops a general framework under Dempster-Shafer theory for assessing fraud risk in a financial statement audit by integrating the evidence pertaining to the presence of fraud triangle factors (incentives, attitude and opportunities), and evidence concerning both account-based and evidence-based fraud schemes. This framework extends fraud risk assessment models in prior research in three respects. 1) It integrates fraud schemes, both account schemes through which accounts are manipulated, and evidence schemes through which frauds are concealed, into a single framework. 2) It incorporates prior fraud frequency information obtained from the Accounting and Auditing Enforcement Releases issued by the Securities and Exchange Commission into an evidential network which uses Conditional OR relationships among assertions. 3) The framework provides a structured approach for connecting risk assessment, audit planning, and evaluation of audit results. The paper uses a real fraud case to illustrate the application of the framework

    The Belief-Function Approach to Aggregating Audit Evidence

    Get PDF
    This is the peer reviewed version of the following article: Srivastava, R. P., "The Belief-Function Approach to Aggregating Audit Evidence" International Journal of Intelligent Systems, Vol. 10, No. 3, March 1995, pp. 329-356., which has been published in final form at http://doi.org/10.1002/int.4550100304. This article may be used for non-commercial purposes in accordance with Wiley Terms and Conditions for Self-Archiving.In this article, we present the belief-function approach to aggregating audit evidence. The approach uses an evidential network to represent the structure of audit evidence. In turn, it allows us to treat all types of dependencies and relationships among accounts and items of evidence, and thus the approach should help the auditor conduct an efficient and effective audit. Aggregation of evidence is equivalent to propagation of beliefs in an evidential network. The paper describes in detail the three major steps involved in the propagation process. The first step deals with drawing the evidential network representing the connections among variables and items of evidence, based on the experience and judgment of the auditor. We then use the evidential network to determine the clusters of variables over which we have belief functions. The second step deals with constructing a Markov tree from the clusters of variables determined in step one. The third step deals with the propagation of belief functions in the Markov tree. We use a moderately complex example to illustrate the details of the aggregation process

    The Belief-Function Approach to Aggregating Audit Evidence

    Get PDF
    This is the author's final draft. The publisher's official version is available from: In this article, we present the belief-function approach to aggregating audit evidence. The approach uses an evidential network to represent the structure of audit evidence. In turn, it allows us to treat all types of dependencies and relationships among accounts and items of evidence, and thus the approach should help the auditor conduct an efficient and effective audit. Aggregation of evidence is equivalent to propagation of beliefs in an evidential network. The paper describes in detail the three major steps involved in the propagation process. The first step deals with drawing the evidential network representing the connections among variables and items of evidence, based on the experience and judgment of the auditor. We then use the evidential network to determine the clusters of variables over which we have belief functions. The second step deals with constructing a Markov tree from the clusters of variables determined in step one. The third step deals with the propagation of belief functions in the Markov tree. We use a moderately complex example to illustrate the details of the aggregation process
    • …
    corecore