Toward Effective Big Data Analysis in Continuous Auditing. By Juan Zhang, Xiongsheng Yang, and Deniz Appelbaum



Similar documents
Encrypting*a*Windows*7*Hard*Disk* with%bitlocker%disk%encryption!

Big Data in Transportation Engineering

Big Data & Security. Aljosa Pasic 12/02/2015

Part A OVERVIEW Introduction Applicability Legal Provision...2. Part B SOUND DATA MANAGEMENT AND MIS PRACTICES...

Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America

Chap. 1: Introduction

Big Data Driven Knowledge Discovery for Autonomic Future Internet

Principal MDM Components and Capabilities

Data Refinery with Big Data Aspects

Health Management for In-Service Gas Turbine Engines

Chapter 6. Foundations of Business Intelligence: Databases and Information Management

Table: Security Services (X.800)

FutureWorks Nokia technology vision 2020: personalize the network experience. Executive Summary. Nokia Networks

Big Data, Integration and Governance: Ask the Experts

One Continuous Auditing Practice in China: Data-oriented Online Auditing(DOOA)

BIG DATA FUNDAMENTALS

Log Management Standard 1.0 INTRODUCTION 2.0 SYSTEM AND APPLICATION MONITORING STANDARD. 2.1 Required Logging

Machine Data Analytics with Sumo Logic

CONNECTING DATA WITH BUSINESS

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

1. Understanding Big Data

Enhanced Call Tracking System (ECaTS)

Exploiting Data at Rest and Data in Motion with a Big Data Platform

Industry Models and Information Server

Symantec Enterprise Vault.cloud Overview

Tolling Systems Security. Ken Philmus Xerox Transportation Services

NIST Big Data Public Working Group

Software Requirements Specification. Schlumberger Scheduling Assistant. for. Version 0.2. Prepared by Design Team A. Rice University COMP410/539

IBM ECM Employee Lifecycle Management August HR best practices: Managing employee information from hire to retire

Whitepaper Data Governance Roadmap for IT Executives Valeh Nazemoff

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

Taking Data Analytics to the Next Level

Master big data to optimize the oil and gas lifecycle

Application of Data Mining Techniques in Intrusion Detection

Create Beautiful Reports with AWR Cloud and Prove the Value of Your SEO Efforts

How To Make Data Streaming A Real Time Intelligence

Building Confidence in Big Data Innovations in Information Integration & Governance for Big Data

Eleven Steps to Success in Data Warehousing

A Model-based Methodology for Developing Secure VoIP Systems

Exploiting the power of Big Data

Survey of Big Data Architecture and Framework from the Industry

PSG College of Technology, Coimbatore Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.

Industrial Dr. Stefan Bungart

Associate Prof. Dr. Victor Onomza Waziri

Fixity Checks: Checksums, Message Digests and Digital Signatures Audrey Novak, ILTS Digital Preservation Committee November 2006

Alexander Nikov. 5. Database Systems and Managing Data Resources. Learning Objectives. RR Donnelley Tries to Master Its Data

Information System Security

How Can I Deliver Innovative Customer Services Across Increasingly Complex, Converged Infrastructure With Less Management Effort And Lower Cost?

BIG DATA. John A. Eisenhauer Chair, Data Governance Society Rick Young - Managing Director 3Sage Consulting

Introduction. Background

A New Era Of Analytic

Information Technology Audit & Forensic Techniques. CMA Amit Kumar

SUCCESSES AND CHALLENGES DEVELOPING AN ENTERPRISE CLINICAL ANALYTICS SOLUTION Ambulatory Information Management (AIM)

CS 203 / NetSys 240. Network Security

Improving Webpage Visibility in Search Engines by Enhancing Keyword Density Using Improved On-Page Optimization Technique

BIG DATA: CHALLENGES AND OPPORTUNITIES IN LOGISTICS SYSTEMS

Observer Analysis Advantages

Susan J Hyatt President and CEO HYATTDIO, Inc. Lorraine Fernandes, RHIA Global Healthcare Ambassador IBM Information Management

Big Data Analytics in Health Care

THE BLUENOSE SECURITY FRAMEWORK

File Document Management System

EHR Business Process Models for Care Coordination and MU

Effecting Data Quality Improvement through Data Virtualization

Data Security Concerns for the Electric Grid

Module 2 IS Assurance Services

Google Analytics tags migration to Google Tag Manager in a multi-site environment Monday, 28 September :55

From Data to Foresight:

Cloudbuz at Glance. How to take control of your File Transfers!

Mohan Sawhney Robert R. McCormick Tribune Foundation Clinical Professor of Technology Kellogg School of Management

OPERATIONAL RISK MANAGEMENT & MODELLING FROM WYNYARD GROUP & EVMTECH

Network Security. Chapter 9 Integrating Security Services into Communication Architectures

Search Result Optimization using Annotators

Security Controls for the Autodesk 360 Managed Services

BIG DATA: BIG CHALLENGE FOR SOFTWARE TESTERS

Computer Security Log Files as Evidence

Security Infrastructure for Trusted Offloading in Mobile Cloud Computing

Enterprise Data Quality

Cryptography and Network Security

Find the Information That Matters. Visualize Your Data, Your Way. Scalable, Flexible, Global Enterprise Ready

A Framework for Data Migration between Various Types of Relational Database Management Systems

How To Make A Network Overlay More Efficient

Software Engineering for Big Data. CS846 Paulo Alencar David R. Cheriton School of Computer Science University of Waterloo

Enabling Data Quality

Enable Business Agility and Speed Empower your business with proven multidomain master data management (MDM)

White Paper Customer Preference Management (CPM) for Utilities Industry using SAP CR&B. Contents.

The OSI Model and the TCP/IP Protocol Suite PROTOCOL LAYERS. Hierarchy. Services THE OSI MODEL

Big Data & Analytics. The. Deal. About. Jacob Büchler jbuechler@dk.ibm.com Cand. Polit. IBM Denmark, Solution Exec IBM Corporation

Transcription:

Toward Effective Big Data Analysis in Continuous Auditing By Juan Zhang, Xiongsheng Yang, and Deniz Appelbaum

Introduction New sources: emails, phone calls, click stream traffic, social media, news media, sensor recordings and videos, and RFID tags 4 V s of Big Data (Laney, 2001; IBM, 2012): Volume Variety Velocity Veracity Purpose of paper: To identify these gaps and challenges and to point out the need for updating the CA system to accommodate Big Data analysis

Big Data and Transforming the Continuous Audit Continuous Auditing (CA) is to provide assurance simultaneously with, or a short period of time after, the occurrence of events underlying the subject matter (CICA/AICPA, 1999) CA is needed to access and process Big Data; BD creates chance for wider scale and range of auditing How to deliver value from the Big Data repositories? - Connections and relations are paramount 4 V s creates gaps of data consistency, data identification, data aggregation, and data integrity The main elements of CA architecture, such as data provisioning, data filtering, and data diagnosis will need to be altered for the Big Data environment

Big Data and Transforming the Continuous Audit

Big Data Gaps and Challenges to Continuous Auditing Data Consistency: summarizes the validity, accuracy, usability and integrity of related data between applications and across an organization. Big Data = more gaps in data consistency Big Data = Map Reduce/Hadoop 3 types of data inconsistency: data formats data synchronization data contradiction Integrating methodologies that can address these issues in a CA system of Big Data without losing efficiency is an area of future research

Big Data Gaps and Challenges to Continuous Auditing Data Integrity: maintaining and assuring the accuracy and consistency of data over its entire life cycle. lack of data integrity = data tampering or incomplete data? (physical or logical causation) Traditional methods of integrity checks such as reasonability, edit checks, and comparison with other sources may not be currently practical in a Big Data environment 2 types of data integrity issues: Modification: unintentional or intentional (could be detected with message digest keys Menezes et al, 1996) Incomplete Data: various causes from human error to system glitches, various classic but infeasible methods

Big Data Gaps and Challenges to Continuous Auditing Data Identification: regarding records that link two or more separately recorded bits of information about the same individual or entity (Newcombe et al, 1959) Challenging to connect disparate types of data from varied sources concerning the same event/entity Two main methods to address this issue: Semantic rules: based on the experience and knowledge required to set the identification rules Similarity Measures: various algorithms based on fuzzy matches of distance and frequency. Challenge: most provide just probabilistic measures on data identification, and this audit risk to the CA system is magnified with Big Data

Big Data Gaps and Challenges to Continuous Auditing Data Aggregation: Data aggregation is any process in which information is gathered and expressed in a summary form Kogan et al (2014): aggregation of exception data derived from Big Data can aid in the identification of patterns Alles et al (2006): alarms should be aggregated to pinpoint weaknesses in certain control areas Perols and Murthy (2011): layered framework that aggregates the alarms instead of the raw data Challenge: the more aggregated the data, the more normal it will appear to be and detections may be missed at the detail level. This issue is compounded with BD!

Big Data Gaps and Challenges to Continuous Auditing Data Confidentiality: certain data, or more often the associations among data points, are sensitive and cannot be released to others (Ciriani et al, 2009) If sensitive data is associated with other data sources in Big Data, the damage can be significant to individuals and businesses Two issues about data confidentiality in a CA system: Data searching: search encrypted data? Audit the encrypted data: techniques with encryption algorithms are suggested, but time consuming Challenge: how to audit private Big Data while protecting its confidentiality and preserving some utility?

Concluding Remarks Focused on Big Data challenges to data analytics in CA The Four Big Data qualities: Volume Variety Velocity Veracity Which Create these Big Data Gaps: Data Consistency Data Integrity Data Identification Data Aggregation Data Confidentiality Research is needed in these areas to increase the applicability of CA in Big Data!!