1 / 13

Data Mining of Emails to Support Periodic and Continuous Assurance Discussant’s Comments

Data Mining of Emails to Support Periodic and Continuous Assurance Discussant’s Comments. Bob Cuthbertson, CA ●IT CaseWare IDEA Inc. First reactions. This is a really great subject with intriguing possibilities. First reactions. This is a really great subject with intriguing possibilities

quilla
Download Presentation

Data Mining of Emails to Support Periodic and Continuous Assurance Discussant’s Comments

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Data Mining of Emails to Support Periodic and Continuous AssuranceDiscussant’s Comments Bob Cuthbertson, CA●IT CaseWare IDEA Inc.

  2. First reactions • This is a really great subject with intriguing possibilities

  3. First reactions • This is a really great subject with intriguing possibilities • This is completely impossible in an audit context

  4. First reactions • This is a really great subject with intriguing possibilities • This is completely impossible in an audit context • Maybe there’s something here after all

  5. Techniques • Content analysis • Key word • Deception clues • Log analysis • Volume and velocity • Social network analysis

  6. Techniques – work for CA? • Content analysis • Key word √ • Deception clues X • Log analysis • Volume and velocity √ • Social network analysis X

  7. Final Comments • No real discussion of e-mail attachments – same principles and techniques?

  8. Final Comments • No real discussion of e-mail attachments – same principles and techniques? • How authoritative is the research? Stand up in court?

  9. Final Comments • No real discussion of e-mail attachments – same principles and techniques? • How authoritative is the research? Stand up in court? • Behavior changes when monitoring is known

  10. Final Comments • No real discussion of e-mail attachments – same principles and techniques? • How authoritative is the research? Stand up in court? • Behavior changes when monitoring is known • Deception may not indicate fraud – could be just another form of corporate *ss covering

  11. Final Comments • No real discussion of e-mail attachments – same principles and techniques? • How authoritative is the research? Stand up in court? • Behavior changes when monitoring is known • Deception may not indicate fraud – could be just another form of corporate *ss covering • Most of the research was presumably done on English text from English speakers • English text from non-English speakers • Non-English text

  12. Really final comment • What control improvements or additional assurance are provided by e-mail data mining? • e.g. would CA of Enron e-mails turn up any thing that wasn’t already known?

  13. Conclusion • Terrific review of literature and the issues • “Further research” needs a bit of beefing up

More Related