Forensic Monitoring System
|
|
|
- Camron Baldwin
- 10 years ago
- Views:
Transcription
1 Forensic Monitoring System Technical Report September 2007 Number W0702 Chuah Siang Chee American Institute of CPAs
2 Copyright 2007 by American Institute of Certified Public Accountants, Inc. Forensic Monitoring System 1
3 Forensic Monitoring System Chuah Siang Chee The Forensic Monitoring project was charted with developing a system to identify test items that may have been compromised, and thereby endanger the integrity of the Uniform CPA Examination. This is be done primarily by monitoring the proportion of correct responses for each item across testing windows. This will allow us to monitor the performance of items across time and to identify unusual fluctuations in item performance. If the proportion of correct responses is above and beyond the expected response rate, it would trigger further investigation into the integrity of the items. This would allow us to make a decision on retiring the item from the item pool. Forensic analysis is conducted on the multiple-choice items and simulation items for all sections of the Uniform CPA Examination. The Uniform CPA Examination consists of four sections: audit and attestation (AUD), financial accounting and reporting (FAR), regulation (REG), and business environment and concepts (BEC). Three of the sections (AUD, FAR, and REG) consist of an adaptive multi-stage test (MST) for the multiple choice items, two simulation items, and constructed response items. The BEC currently has multiple choice items that are not administered using an adaptive algorithm. There are no simulation items associated with the BEC presently. Forensic Monitoring System 2
4 Description of System This system was built on a Microsoft Access platform. It combines historical data across all previously administered CBT administrations of the Uniform CPA Examination. Initial data processing is done using SAS to generate text files which are then loaded on the Microsoft Access database. Currently, new data for each window is appended to the database at the end of each test window. The Forensic Monitoring system tracks the proportion of examinees that correctly answer a particular item, or p-value. However, natural fluctuations in the abilities of examinees across test windows as well as restriction of range for multiple choice items because of the adaptive administration confound direct assessment of the proportion correct scores. In order to resolve these limitations, the observed proportion correct scores is contrasted with the expected proportion correct scores in order to determine if scores are within tolerances. The expected proportion correct score is calculated based on the IRT parameters and conditional upon the ability level of the examinee administered the specific test item. Difference scores from the expected minus the observed proportion correct scores allow us to control for natural fluctuations in examinee ability and the range restrictions from multi-stage testing. If ability-adjusted difference scores are not used, the tolerance levels would require a wide range, or increase risk of false positives would occur. This would in turn reduce the sensitivity of the forensic monitoring system to detect security breaches. Data in the Forensic Monitoring System is partitioned according to months. Each test window consists of two months of testing before the item pool is replaced. The rationale for this decision was to detect if examinees might be harvesting items at the beginning of a test window Forensic Monitoring System 3
5 and distributing the information to conspirators later in the test window. By partitioning the first and second month of testing, the system would be able to detect significant compromises in the security of the test if such a situation were to occur. Identification of Suspect Items Identification of suspect items in the Forensic Monitoring software currently requires human interpretation. There are no strict rules as to what dictates a suspect item, we have several constrains proposed for identifying suspect items. 1. Real p-values are significantly higher than expected p-values. 2. Sustained increase of real p-values over expected p-values three or more testing windows. 3. Significant increase in real p-values in the second month of test window. Several charts are provided to track the performance of a particular item across windows. These charts include the expected and observed p-value Also included is the standard error of the p-value. This allows the number of examinees to be taken into consideration when interpretation results and serves as a guide in interpreting if there are significant differences between the expected and observed p-value. The process of identifying suspect items is time consuming because each item must be individually inspected. In order to improve efficiency the Forensic Monitoring software provides several statistics to restrict the list of potential items. These include: 1. The absolute size of the fluctuations in the observed p-value. If there is excessive fluctuation, it may indicate that something has occurred to compromise or change the item from previous administrations. Forensic Monitoring System 4
6 2. The absolute size of the fluctuations in the difference between the expected and observed p-value. This is akin to fluctuations of the observed p-value, but takes into account the fluctuations of ability of examinees. 3. The difference between the expected and the observed p-value for the last window the item was administered in. This is provided in order to limit searches to the current or latest test window. 4. The difference between the first window difference score (which is the difference between expected and observed p-value) and the last window difference score, in which the item was administered. Below are samples of the charts available to interpretation. Figure 1 shows the difference between the expected and observed p-value, and standard error of an item across several test windows. Each data point represents a month of testing. Therefore, 05Q21 represents the first month of testing for the second quarter for the year As we can see from the chart, the difference between the expected and observed p-values is generally within a standard error. There does not appear to be a significant difference between the expected and observed p-value in the example given. Figure 1. Difference Between Expected and Observed P-value and Standard Error of a Test Item by Window Diff Pval Standard Error P-Value Diff Q21 04Q31 04Q41 05Q11 05Q21 05Q31 05q41 Window Forensic Monitoring System 5
7 Figure 2 shows the expected and observed p-value for a test item across test windows. There does not appear to be a significant deviation between the expected and observed p-value. Interpretation of the observed without the inclusion of the expected p-value would be difficult because the p-value fluctuates considerably in this example. Therefore, including the expected p- value is an important instrument for interpreting results for the Forensic Monitoring system. Figure 2. The Expected P-value and observed P-value of a Test Item by Window PVal Expected P P-Value Q21 04Q31 04Q41 05Q11 05Q21 05Q31 05q41 Window The Forensic Monitoring system is currently operational. Analysis of the results beginning 04Q2 to the last completed window (05Q4) is complete. Results suggest that there are no significant compromises in test security. A small number of items have been flagged as suspect items, 4 items out of the item pool. Figure 3 illustrates the performance of a particular item that has been identified as suspect. There appears to be a slight increase in the proportion of examinees correctly answering the item over time. Forensic Monitoring System 6
8 Figure 3. Difference Between Expected and Observed P-value and Standard Error of a Suspect Test Item Diff Pval Standard Error P-Value Diff Q31 04Q32 04Q41 04Q42 05Q11 05Q12 05Q31 05Q32 Window However, such small fluctuations do not necessarily mean that the item has been compromised. The p-value is expected to fluctuate to a small degree across windows. In addition, the small number of items that were flagged as suspect items suggests that there is currently no significant compromise to the security of the test. Other Applications In addition identifying items that may be compromised the Forensic Monitoring program has other potential applications. These include the ability to identify items where the current accounting rules pertaining to that item may have changed or to identify inconsistencies between item parameters and data. The Uniform CPA Examination is based on governmental rules that frequently change. Consequently, there is a need to actively perform obsolescence analysis of Forensic Monitoring System 7
9 the items in order to assure that the examination has kept up with the code. If there has been a change and the keyed response is no longer correct, the item statistics for that item might reflect this discrepancy. The system could also be used to study the lifecycle of the item. Indications that an item properties change over time might inform policy decisions about item use and retirement. Schedule of Analysis It is proposed that the Forensic Monitoring analysis be run at the completion of each testing window. This is the most opportune to run the analysis because all item parameters and statistics will be available. It is also the soonest that the analysis can be conducted. Conducting the analysis in the middle of the test window, before the completion of the window would exclude items that might not have their final item parameters. Procedural Recommendations For the Forensic Monitoring program to be effective, there need to be procedures in place to respond once items have been flagged as behaving suspiciously. Below are several recommendations for procedures. Having a second psychometrician to evaluate items already flagged as being suspicious. The identification of suspect items is a subjective process, and having concurrence should improve the process. Once an item is flagged as suspicious, a test developer should review the identified item in order to determine if there is a reason for the behavior of the item statistics. If no Forensic Monitoring System 8
10 acceptable reason can explain the item behavior, the status of the item should be escalated in order to determine an appropriate response. Once an item s status has been escalated, a process needs to be in place to retire an item, or in the extreme case, to not score the item. In order to implement such a process, a senior manager should be designated with the task of approving the decision to permanently/temporarily retire an item, or not to score the item. The procedure also requires that the personnel from content and production be informed if an item has been retired from the item pool. Accordingly, if an item is marked as a do not score, the appropriate personnel from production need to be informed to make the necessary changes to the scoring algorithm. Future Enhancements Future enhancements under development include the analysis by test center. This would enable the system to detect conspiracies that are localized to certain areas or districts. The rationale is that, if there is a local organization that has somehow compromised the security of the test, many of the students would be geographically close. Consequently, test scores for a local test center should be higher than surrounding areas. One current shortcoming of the system is its inability to identify individual examinees that might be cheating. Research is currently under consideration in order to determine a manner in which individual cheaters might be identified. Forensic Monitoring System 9
TO KNOW TO BECOME A CPA IN INDIANA
WHAT YOU NEED TO KNOW TO BECOME A CPA IN INDIANA The CPA Exam will be one of the most challenging tests you will take. But with a solid educational foundation, excellent resources and the dedication to
LOGIC SCHOOL OF INTERNATIONAL STUDIES The online wing of LOGIC Group customized for the interest of Global Online Students.
LOGIC SCHOOL OF INTERNATIONAL STUDIES The online wing of LOGIC Group customized for the interest of Global Online Students. Logic is an Authorised Partner of IMA & WILEY. 1 CPA exam is conducted by American
CPA. Certified Public Accountant. Handbook
CPA Certified Public Accountant Handbook CPA Certified Public Accountant What is a CPA A CPA is a certified public accountant who is licensed by a state board of accountancy. To earn the prestige associated
Detecting Cheating in Computer Adaptive Tests Using Data Forensics. James C. Impara, Caveon, Caveon, LLC. Gage Kingsbury, NWEA
Detecting Cheating in Computer Adaptive Tests Using Data Forensics James C. Impara, Caveon, Caveon, LLC Gage Kingsbury, NWEA Dennis Maynes and Cyndy Fitzgerald, Caveon, LLC Key Words: Test security, detecting
Maintaining the Relevance of the Uniform CPA Examination
Invitation to Comment Maintaining the Relevance of the Uniform CPA Examination Issued: September 2, 2014 Comments Due: December 2, 2014 AICPA Board of Examiners Please submit all comments via the online
The relationship between 150-credit hours, accounting credit hours and CPA pass rates
The relationship between 150-credit hours, accounting credit hours and CPA pass rates ABSTRACT Jason Haen St. Norbert College Amy Spielbauer-Vandenberg St. Norbert College Ariel Bloniarz St. Norbert College
CERTIFIED PUBLIC ACCOUNTANT (CPA)
CERTIFIED PUBLIC ACCOUNTANT (CPA) Certified Public Accountant (CPA) is the highest accounting qualification in the United States of America. One has to pass the Uniform CPA Examination conducted by the
Performance of HBCUs on the CPA examination for the year 2010
ABSTRACT Performance of HBCUs on the CPA examination for the year 2010 Forrest Thompson Albany State University There are over one-hundred Historically Black Colleges and Universities (HBCUs) in the United
M NCPA FACTS ABOUT THE CPA EXAM AND CERTIFICATION
M NCPA FACTS ABOUT THE CPA EXAM AND CERTIFICATION 2015/2016 CPA CERTIFICATION THE FUTURE IS SO BRIGHT THE CPA CREDENTIAL WHY IT S IMPORTANT CPAs are taking care of business in every industry and there
Become a CPA. in New Hampshire
Become a CPA in New Hampshire 1 Get to know these organizations they ll help you become a CPA. The National Association of State Boards of Accountancy (NASBA) NASBA is the central clearinghouse for the
Overview & Facts Everything you need to know about sitting for the Uniform CPA Exam as an Illinois Candidate.
Overview & Facts Everything you need to know about sitting for the Uniform CPA Exam as an Illinois Candidate. Revised 6.3.15 Overview: The information provided in this brochure is intended to inform Illinois
Become a CPA. in Pennsylvania. www.picpa.org/cpaexam
Become a CPA in Pennsylvania 1 Get to know these organizations they ll help you become a CPA. The National Association of State Boards of Accountancy (NASBA) NASBA is the central clearinghouse for the
Local outlier detection in data forensics: data mining approach to flag unusual schools
Local outlier detection in data forensics: data mining approach to flag unusual schools Mayuko Simon Data Recognition Corporation Paper presented at the 2012 Conference on Statistical Detection of Potential
MICPA. Guide to Becoming A Michigan CPA. Education Examination Experience. Learn more. Sponsored in part by:
MICPA Guide to Becoming A Michigan CPA Education Examination Experience Sponsored in part by: Learn more The 3 E-ssentials for becoming a CPA in Michigan Education + Examination + Experience = MI CPA Completing
MEMBER REGULATION NOTICE SUITABILITY
Contact: Ken Woodard Director, Communications and Membership Services Phone: (416) 943-4602 Email: [email protected] MR-0069 April 14, 2008 (Revised February 22, 2013) MEMBER REGULATION NOTICE SUITABILITY
cpa exam FAQs FREQUENTLY ASKED QUESTIONS CPA EXAM REVIEW
cpa exam FAQs FREQUENTLY ASKED QUESTIONS CPA EXAM REVIEW applying, scheduling and sitting for the cpa exam HOW DO I APPLY FOR THE CPA EXAM? Detailed information on how to apply, including state-by-state
Assessing the Adequacy and Effectiveness of a Fund s Compliance Policies and Procedures. December 2005
Assessing the Adequacy and Effectiveness of a Fund s Compliance Policies and Procedures December 2005 Copyright 2005 Investment Company Institute. All rights reserved. Information may be abridged and therefore
Development and Validation of the National Home Inspector Examination
Development and Validation of the National Home Inspector Examination Examination Board of Professional Home Inspectors 800 E. Northwest Hwy. Suite 708 Palatine Illinois 60067 847-298-7750 [email protected]
QUALITY MANAGEMENT SYSTEM REQUIREMENTS
QUALITY MANAGEMENT SYSTEM REQUIREMENTS FOR BUILDERS 2014 400 Prince George s Blvd. Upper Marlboro, MD 20774 800.638.8556 HomeInnovation.com TABLE OF CONTENTS Introduction... iii Notes... iii 1 General...1
Comparison of AACSB Accounting Accredited and AACSB Business Accredited Institutions Using the CPA Examination as a Post-Curriculum Assessment
Comparison of AACSB Accounting Accredited and AACSB Business Accredited Institutions Using the CPA Examination as a Post-Curriculum Assessment Randall B. Bunker Murray State University Corey S. Cagle University
Continuous Monitoring: Match Your Business Needs with the Right Technique
Continuous Monitoring: Match Your Business Needs with the Right Technique Jamie Levitt, Ron Risinger, September 11, 2012 Agenda 1. Introduction 2. Challenge 3. Continuous Monitoring 4. SAP s Continuous
WHITEPAPER. Complying with the Red Flag Rules and FACT Act Address Discrepancy Rules
WHITEPAPER Complying with the Red Flag Rules and FACT Act Address Discrepancy Rules May 2008 2 Table of Contents Introduction 3 ID Analytics for Compliance and the Red Flag Rules 4 Comparison with Alternative
RADLEY ACURA RED FLAG IDENTITY THEFT PROTECTION PROGRAM and ADDRESS DISCREPANCY PROGRAM
RADLEY ACURA RED FLAG IDENTITY THEFT PROTECTION PROGRAM and ADDRESS DISCREPANCY PROGRAM SUMMARY OF OUR PROGRAM AND PROCESSES This dealership is committed to protecting its customers and itself from identity
THE ARIZONA STATE BOARD OF ACCOUNTANCY
Print Form THE ARIZONA STATE BOARD OF ACCOUNTANCY INFORMATION FOR RE-EXAM APPLICANTS FOR THE UNIFORM CPA EXAMINATION The Arizona State Board of Accountancy (Board) and the National Association of State
Bank Secrecy Act Anti-Money Laundering Examination Manual
Bank Secrecy Act Anti-Money Laundering Examination Manual Core Overview - Customer Identification Program Assess the bank's compliance with the statutory and regulatory requirements for the Customer Identification
STATE OF RHODE ISLAND AND PROVIDENCE PLANTATIONS. BOARD OF ACCOUNTANCY 1511 Pontiac Avenue, #68-1 Cranston, Rhode Island 02920
BOARD OF ACCOUNTANCY Cranston, Rhode Island 02920 APPLICATON FOR CPA CERTIFICATE WITHOUT WRITTEN EXAMINATION To the Rhode Island Board of Accountancy: I hereby make application to be examined by the Rhode
2015 TRENDS IN THE SUPPLY OF ACCOUNTING GRADUATES AND THE DEMAND FOR PUBLIC ACCOUNTING RECRUITS
2015 TRENDS IN THE SUPPLY OF ACCOUNTING GRADUATES AND THE DEMAND FOR PUBLIC ACCOUNTING RECRUITS By AICPA Students, Academics & Inclusion CX Act Copyright 2015 American Institute of CPAs. All right reserved.
European Code for Export Compliance
European Code for Export Compliance EU-CEC European Institute For Export Compliance EU-ECF EU Export Compliance Framework: EU Export Compliance Charter The European Code for Export Compliance EU-CEC 1.
SAS. Fraud Management. Overview. Real-time scoring of all transactions for fast, accurate fraud detection. Challenges PRODUCT BRIEF
PRODUCT BRIEF SAS Fraud Management Real-time scoring of all transactions for fast, accurate fraud detection Overview Organizations around the globe lose approximately 5 percent of annual revenues to fraud,
Safe Passage Online Training Overview. Objectives
Safe Passage Online Training Overview Copyright 2012 Safe Passage International, Inc. All rights reserved. Identify the features and benefits of the Safe Passage Training Management System (TMS). Explain
TRENDS. 2013 TRENDS a
2013 TRENDS in the supply of Accounting Graduates and the Demand for Public Accounting Recruits 2013 TRENDS a By Scott Moore Director, Student and Professional Pathways Academic & Career Awareness TARP
DATA AUDIT: Scope and Content
DATA AUDIT: Scope and Content The schedule below defines the scope of a review that will assist the FSA in its assessment of whether a firm s data management complies with the standards set out in the
Questions and Answers About the Identity Theft Red Flag Requirements
Questions and Answers About the Identity Theft Red Flag Requirements 1. Who is covered by the new Identity Theft Regulations? The Identity Theft Regulations consist of three different sets of requirements,
Asset management firms and the risk of market abuse
Financial Conduct Authority Asset management firms and the risk of market abuse February 2015 Thematic Review TR15/1 TR15/1 Asset management firms and the risk of market abuse Contents 1. Executive summary
Facts About FACTA Red Flag Identity Theft Prevention Program
FACTA Red Flag Identity Theft Prevention Program FACTA Red Flag Policy Program, page 1 of 6 Contents Overview 3 Definition of Terms 3 Covered Accounts..3 List of Red Flags 3 Suspicious Documents...4 Suspicious
HKSA 500 Issued July 2009; revised July 2010, May 2013, February 2015
HKSA 500 Issued July 2009; revised July 2010, May 2013, February 2015 Effective for audits of financial statements for periods beginning on or after 15 December 2009 Hong Kong Standard on Auditing 500
BOARD OF NURSE EXAMINERS FOR THE STATE OF TEXAS 333 GUADALUPE STREET, SUITE 3-460 AUSTIN, TX 78701
BOARD OF NURSE EXAMINERS FOR THE STATE OF TEXAS 333 GUADALUPE STREET, SUITE 3-460 AUSTIN, TX 78701 Criteria for Evaluation of National Certification Examinations for Recognition from the Board of Nurse
Get. Get. Career Ready.
Get CPA READY. Get Career Ready. The Fox Master of Accountancy If you aspire to become a CPA, the Fox one-year Master of Accountancy (MAcc) program is your bridge to a career in public accounting. We
Reporting on Controls at a Service Organization
Reporting on Controls at a Service Organization 1529 AT Section 801 Reporting on Controls at a Service Organization (Supersedes the guidance for service auditors in Statement on Auditing Standards No.
Attachment-VEE STANDARDS FOR VALIDATING, EDITING, AND ESTIMATING MONTHLY AND INTERVAL DATA
Attachment-VEE STANDARDS FOR VALIDATING, EDITING, AND ESTIMATING MONTHLY AND INTERVAL DATA This Page Intentionally Left Blank Table of Contents SECTION A: CA INTERVAL DATA VEE RULES 1. INTRODUCTION...
Number: 56.300. Index
Identity Theft Prevention Program Section: General Operations Title: Identity Theft Prevention Program Number: 56.300 Index POLICY.100 POLICY STATEMENT.110 POLICY RATIONALE.120 AUTHORITY.130 APPROVAL AND
INTERNATIONAL STANDARD ON AUDITING 330 THE AUDITOR S RESPONSES TO ASSESSED RISKS CONTENTS
INTERNATIONAL STANDARD ON AUDITING 330 THE AUDITOR S RESPONSES TO ASSESSED RISKS (Effective for audits of financial statements for periods beginning on or after December 15, 2009) CONTENTS Paragraph Introduction
Special Considerations Audits of Group Financial Statements (Including the Work of Component Auditors)
HKSA 600 Issued September 2009; revised July 2010, May 2013, June 2014*, February 2015 Effective for audits of financial statements for periods beginning on or after 15 December 2009 Hong Kong Standard
Performing Audit Procedures in Response to Assessed Risks and Evaluating the Audit Evidence Obtained
Performing Audit Procedures in Response to Assessed Risks 1781 AU Section 318 Performing Audit Procedures in Response to Assessed Risks and Evaluating the Audit Evidence Obtained (Supersedes SAS No. 55.)
Boosting enterprise security with integrated log management
IBM Software Thought Leadership White Paper May 2013 Boosting enterprise security with integrated log management Reduce security risks and improve compliance across diverse IT environments 2 Boosting enterprise
White paper Security Solutions Advanced Theft Protection (ATP) Notebooks
White paper Security Solutions Advanced Theft Protection (ATP) Notebooks Contents Introduction 2 Approaching the Challenge 4 Fujitsu s Offering Advanced Theft Protection (ATP) 5 Fujitsu is taken the lead
GUIDELINES INDEPENDENT CERTIFIED PUBLIC ACCOUNTANTS PERFORMING FINANCIAL STATEMENT AUDITS OF STATE AGENCIES
GUIDELINES TO INDEPENDENT CERTIFIED PUBLIC ACCOUNTANTS PERFORMING FINANCIAL STATEMENT AUDITS OF STATE AGENCIES STATE AUDITOR Robert R. Peterson 1 GUIDELINES TO CERTIFIED PUBLIC ACCOUNTANTS PERFORMING FINANCIAL
2015 TRENDS IN THE SUPPLY OF ACCOUNTING GRADUATES AND THE DEMAND FOR PUBLIC ACCOUNTING RECRUITS
2015 TRENDS IN THE SUPPLY OF ACCOUNTING GRADUATES AND THE DEMAND FOR PUBLIC ACCOUNTING RECRUITS By AICPA Students, Academics & Inclusion CX Act Copyright 2015 American Institute of. All right reserved.
AUSTIN INDEPENDENT SCHOOL DISTRICT INTERNAL AUDIT DEPARTMENT PAYROLL AUDIT PROGRAM
PAYROLL GENERAL: The Payroll Department is responsible for processing all District payrolls and compliance with all rules and regulations pertaining to and/or resulting from payroll operations which includes
Wolfsberg Statement on AML Screening, Monitoring and Searching (2009)
Wolfsberg Statement on AML Screening, Monitoring and Searching (2009) 1. Introduction The Wolfsberg Group 1 issued its initial paper examining how financial institutions could develop suitable screening,
I. Purpose. Definition. a. Identity Theft - a fraud committed or attempted using the identifying information of another person without authority.
Procedure 3.6: Rule (Identity Theft Prevention) Volume 3: Office of Business & Finance Managing Office: Office of Business & Finance Effective Date: December 2, 2014 I. Purpose In 2007, the Federal Trade
Security Services and Investigators Act Provincial Examination Process
Upon completion of an approved or accredited basic security or investigator training course in Alberta, applicants must pass a provincially-administered final exam with a score of not less than 80% in
No filter is perfect. But with your help, MailCleaner may aim at perfection. Case Description Solution
A Filter inaccuracies No filter is perfect. But with your help, MailCleaner may aim at perfection. The filtering system implemented by MailCleaner relies on automated and systematic controls that cannot
INDEPENDENT VERIFICATION AND VALIDATION OF EMBEDDED SOFTWARE
PREFERRED RELIABILITY PRACTICES PRACTICE NO. PD-ED-1228 PAGE 1 OF 6 INDEPENDENT VERIFICATION AND VALIDATION OF EMBEDDED SOFTWARE Practice: To produce high quality, reliable software, use Independent Verification
FFIEC BSA/AML Examination Manual. Four Key Components of a Suspicious Activity Monitoring Program
FFIEC BSA/AML Examination Manual Four Key Components of a Suspicious Activity Monitoring Program 1 2 IDENTIFICATION OF SUSPICIOUS ACTIVITY 3 Unusual Activity Identification Employee Identification Law
Solvency II Data audit report guidance. March 2012
Solvency II Data audit report guidance March 2012 Contents Page Introduction Purpose of the Data Audit Report 3 Report Format and Submission 3 Ownership and Independence 4 Scope and Content Scope of the
THE AUDITOR S RESPONSES TO ASSESSED RISKS
SINGAPORE STANDARD ON AUDITING SSA 330 THE AUDITOR S RESPONSES TO ASSESSED RISKS This revised Singapore Standard on Auditing (SSA) 330 supersedes SSA 330 The Auditor s Procedures in Response to Assessed
STATEMENT FROM THE CHAIRMAN
STATEMENT FROM THE CHAIRMAN In an ever-changing global marketplace, it is important for all of us to have an understanding of the responsibilities each of have in carrying out day-to-day business decisions
Code of Professional Responsibilities in Educational Measurement
Code of Professional Responsibilities in Educational Measurement Prepared by the NCME Ad Hoc Committee on the Development of a Code of Ethics: Cynthia B. Schmeiser, ACT--Chair Kurt F. Geisinger, State
Maryland Board of Public Accountancy CPA Examination Application Process (August 1, 2012)
Maryland Board of Public Accountancy CPA Examination Application Process (August 1, 2012) This report has been prepared to review the CPA examination process administered by the Board of Public Accountancy
THE ABC S OF DATA ANALYTICS
THE ABC S OF DATA ANALYTICS ANGEL BUTLER MAY 23, 2013 HOUSTON AREA SCHOOL DISTRICT INTERNAL AUDITORS (HASDIA) AGENDA Data Analytics Overview Data Analytics Examples Compliance Purchasing and Accounts Payable
General Rules for the Certification of Management Systems Code: RG
General Rules for the Certification of Management Systems Code: RG Drafted on: 1 April 2012 Effective from: 1 October 2012 TABLE OF CONTENTS CHAPTER TITLE PAGE CHAPTER 1 GENERAL 3 CHAPTER 2 REFERENCE STANDARD
FinCEN s Proposed Anti-Money Laundering Compliance Requirements for Investment Advisers: How to Prepare Now
FinCEN s Proposed Anti-Money Laundering Compliance Requirements for Investment Advisers: How to Prepare Now I. INTRODUCTION On August 25, 2015, the Financial Crimes Enforcement Network ( FinCEN ) proposed
Assessment Plan Undergraduate Major in Accounting J. M. Tull School of Accounting Terry College of Business
Assessment Plan Undergraduate Major in Accounting J. M. Tull School of Accounting Terry College of Business The major: Accounting majors prepare for careers in business and accounting and increasingly
Identity Theft Prevention Program Compliance Model
September 29, 2008 State Rural Water Association Identity Theft Prevention Program Compliance Model Contact your State Rural Water Association www.nrwa.org Ed Thomas, Senior Environmental Engineer All
Using the ETS Proficiency Profile Test to Meet VSA Requirements Frequently Asked Questions
Using the ETS Proficiency Profile Test to Meet VSA Requirements Frequently Asked Questions What is the ETS Proficiency Profile? The ETS Proficiency Profile from ETS is an outcomes assessment of four core
The Changing SAS 70 Landscape Dan Hirstein Director Rebecca Goodpasture Senior Manager Deloitte & Touche LLP January 13, 2011
The Changing SAS 70 Landscape Dan Hirstein Director Rebecca Goodpasture Senior Manager Deloitte & Touche LLP January 13, 2011 Table of Contents A Short History of SAS 70 Overview of SSAE 16 and ISAE 3402
Intrusion Detection for Grid and Cloud Computing
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal University of Santa Catarina, Brazil Content Type
Avoiding Buyer s Remorse with AML Monitoring Software. Implementing Effective and Efficient AML Transaction Monitoring Systems
Avoiding Buyer s Remorse with AML Monitoring Software Implementing Effective and Efficient AML Transaction Monitoring Systems Overview A well-designed transaction monitoring program is an important pillar
