Process-mining-enabled audit of information systems: Methodology and an application

被引:26
|
作者
Zerbino, Pierluigi [1 ]
Aloini, Davide [1 ]
Dulmin, Riccardo [1 ]
Mininno, Valeria [1 ]
机构
[1] Univ Pisa, Dept Energy Syst Terr & Construct Engn, Largo Lucio Larmrino I, I-56122 Pisa, Italy
关键词
Information systems audit; Error detection; Process mining; Business process management (BPM); Risk management; Port community system (PCS); CONFORMANCE CHECKING; EXPERT-SYSTEM; ARTIFICIAL-INTELLIGENCE; MANAGEMENT; KNOWLEDGE; FRAUD;
D O I
10.1016/j.eswa.2018.05.030
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Current methodologies for Information Systems (ISs) audits suffer from some limitations that could question the effectiveness of such procedures in detecting deviations, frauds, or abuses. Process Mining (PM), a set of business-process-related diagnostic and improvement techniques, can tackle these weaknesses, but literature lacks contributions that address this possibility concretely. Thus, by framing PM as an Expert System (ES) engine, this paper presents a five-step PM-based methodology for IS audits and validates it through a case in a freight export port process managed by a Port Community System (PCS), an open electronic platform enabling information exchange among port stakeholders. The validation pointed out some advantages (e.g. depth of analysis, easier automation, less invasiveness) of our PM-enabled methodology over extant ESs and tools for IS audit. The substantive test and the check on the PCS processing controls and output controls allowed to identify four major non-conformances likely implying both legal and operational risks, and two unforeseen process deviations that were not known by the port authority, but that could improve the flexibility of the process. These outcomes set the stage for an export process reengineering, and for revising the boundaries in the process flow of the PCS. (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:80 / 92
页数:13
相关论文
共 50 条
  • [31] Methodology and Ontology of Expert System for Information Security Audit
    Atymtayeva, Lyazzat B.
    Bortsova, Gerda K.
    Inoue, Atsushi
    Kozhakhmet, Kanat T.
    6TH INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND INTELLIGENT SYSTEMS, AND THE 13TH INTERNATIONAL SYMPOSIUM ON ADVANCED INTELLIGENT SYSTEMS, 2012, : 238 - 243
  • [32] Process Mining Methodology for Health Process Tracking Using Real-Time Indoor Location Systems
    Fernandez-Llatas, Carlos
    Lizondo, Aroa
    Monton, Eduardo
    Benedi, Jose-Miguel
    Traver, Vicente
    SENSORS, 2015, 15 (12) : 29821 - 29840
  • [33] Process and the method of application of information systems engineering supervision
    Xu Yan-wen
    PROCEEDINGS OF THE 2013 THE INTERNATIONAL CONFERENCE ON EDUCATION TECHNOLOGY AND INFORMATION SYSTEM (ICETIS 2013), 2013, 65 : 263 - 266
  • [34] Mining risk information in hospital information systems as risk mining
    Tsumoto, Shusaku
    Yokoyama, Shigeki
    Matsuoka, Kirniko
    2007 IEEE/ICME INTERNATIONAL CONFERENCE ON COMPLEX MEDICAL ENGINEERING, VOLS 1-4, 2007, : 1917 - +
  • [36] Suggestions for New Application Areas for Soft Systems Methodology in the Information Age
    Richard B. Watson
    Systemic Practice and Action Research, 2012, 25 : 441 - 456
  • [37] A Framework for the Structured Implementation of Process Mining for Audit Tasks
    Foehr, Tassilo L.
    Reichelt, Valentin
    Marten, Kai-Uwe
    Eulerich, Marc
    INTERNATIONAL JOURNAL OF ACCOUNTING INFORMATION SYSTEMS, 2025, 56
  • [38] A Blockchain-Enabled Framework for Improving the Software Audit Process
    Assiri, Mohammed
    Humayun, Mamoona
    APPLIED SCIENCES-BASEL, 2023, 13 (06):
  • [39] Process mining: How to extract knowledge from the process-oriented information systems logs
    Van Der Aalst, W.M.P.
    Burattin, A.
    De Leoni, M.
    Guzzo, A.
    Maggi, F.M.
    Montali, M.
    Mondo Digitale, 2012, 11 (03):
  • [40] Information Systems Risk and Audit Planning
    Bedard, Jean
    Graham, Lynford
    Jackson, Cynthia
    INTERNATIONAL JOURNAL OF AUDITING, 2005, 9 (02) : 147 - 163