You are on page 1of 14

Applied Mathematics and Nonlinear Sciences, 9(1) (2024) 1-14

Applied Mathematics and Nonlinear Sciences


https://www.sciendo.com

Research on big data audit based on financial shared service model

Xiaoyun Yan1,†
1. Guangdong University of Science and Technology, Dongguan, Guangdong, 523083, China.

Submission Info

Communicated by Z. Sabir
Received December 23, 2022
Accepted April 21, 2023
Available online October 11, 2023

Abstract
Financial sharing platform provides data support for big data auditing. This paper first describes the financial shared
service model and big data auditing and then focuses on the application of big data visualization technology in auditing
based on the application principle of big data technology in auditing. Secondly, a visualization method based on a deep
confidence network to extract data features is proposed. The DBN network is trained on audit data, the DBN method is
used to extract data feature values, and the feature results are presented after dimensionality reduction processing. Finally,
the implementation process of big data audit based on the financial shared service model is determined. The audit analysis
of SOE B is performed by using the visual analysis technology of big data. The audit results are as follows: The proportion
of state-owned enterprise B’s construction project business to the current year’s revenue increases slightly year by year,
decreases significantly in 2019, and resumes rapid growth in 2021. The annual net profit increased by 153.17% compared
with the previous year’s net profit.

Keywords: Financial shared services; Big data auditing; Deep confidence networks; Visualization techniques; Data
features.
AMS 2010 codes: 91-02

†Corresponding author.
Email address: yxy9183@126.com ISSN 2444-8656
https://doi.org/10.2478/amns.2023.2.00604
© 2023 Xiaoyun Yan, published by Sciendo.
This work is licensed under the Creative Commons Attribution alone 4.0 License.
2 Xiaoyun Yan. Applied Mathematics and Nonlinear Sciences, 9(1) (2024) 1-14

1 Introduction

Big data auditing refers to the use of computers as a tool to obtain a large amount of electronic data
related to projects in traditional audit work. Using big data analysis technology on the obtained data,
data analysis and data mining are carried out to draw audit conclusions and problem clues. It is a
necessary way for current auditing authorities to meet the challenges of the big data era and the
requirements of full audit supervision [1-3]. Big data auditing is more efficient than traditional
auditing [4]. With the help of emerging technologies, big data auditing greatly accelerates data
processing and computing speed, and a large amount of data matching, screening, and correlation that
cannot be performed manually can be achieved through big data technology [5-6]. Moreover, big data
auditing can break through the barriers of time and space to achieve cross-temporal inspection and
analysis. Big data auditing can realize real-time auditing. Big data auditing then creates favorable
conditions for audit supervision to move forward, such as through networked auditing, audit
information can be uploaded to the audit platform in real-time for auditors to view and analyze, which
helps identify and correct problems in a timely manner and helps audited units to rectify and
standardize [7].

Salijeni, G The study looks at the latest developments in audit technology, namely the rise of big data
and analytics tools, and how auditors can utilize these tools in their audits. The findings suggest that
BDA features, such as scripting, provide large-scale automation of the audit process, creating
opportunities to expand the scope and depth of evidence for audit work [8]. Tupikovskaja-Omovie,
Z. focuses on how audit data can be applied to develop customer journey maps to understand digital
consumer behavior. A specific multi-method research design was used, combining innovative mobile
tracking technology and mobile fashion consumer data from Google Analytics [9]. Appelbaum, D.
states that accounting firms are beginning to retool their audit processes to incorporate technology
and audit data analysis. This is because the traditional audit process seems to be inadequate to meet
the changing market expectations. And discussed the availability of big data in the current
information-centric business environment and the existing data analysis efforts of firms and their
subsequent impact [10]. Holt, T. explored the impact of information structure on auditor judgment
and decision-making. An experiment with 120 auditors found that in the case of expired inventory,
auditors receiving different data, such as emails or visualizations, provided a more conservative risk
assessment than auditors receiving a less ambiguous, more traditional memo format [11]. Kend, M.
examined relevant stakeholders’ perceptions of the impact of big data analytics, artificial intelligence
and robotics in Australia on the audit and assurance services market. A synthesis of these stakeholder
perceptions and a review of relevant accounting literature revealed that the impact of BDA, robotics
and AI on auditing is considered positive [12]. Smidt, L. noted that in a controlled environment
dominated by big data and increasingly electronic audit evidence, it is now almost impossible to
conduct effective and efficient audits without the use of technology-based tools. Generic audit
software is one of the most commonly used technology-based tools by internal audit functions for
control testing [13].

The literature [14-15] points out that in audit research, the design science approach was initially used
implicitly in early studies devoted to the development and evaluation of audit analysis procedures
and audit sampling techniques. The literature [16] suggests that recent advances in information
technology have necessitated a renewed focus on this research approach, especially in light of the
profound changes in current accounting, auditing, and business processes. The literature [17-18]
argues that big data audits in national security, law enforcement, and fraud-fighting have the potential
to bring significant benefits to the state, citizens, and society from big data analytics but that additional
safeguards are needed to protect the fundamental rights of citizens. This involves a critical shift in
focus from regulating big data collection to regulating the analysis and use phase. The literature [19]
points out that in order to benefit from the application of big data analytics in the audit field, a
Research on big data audit based on financial shared service model 3

framework must be developed to add a new layer of protection for fundamental rights against misuse
and malicious use. The literature [20-21] shows the need for additional regulation at the analytic and
usage levels and for a stronger oversight system. A duty of care should be introduced at the analytical
level as part of the internal audit and external review process.

This paper first analyzes the financial shared services model and builds a financial shared services
platform. The big data audit is elaborated, focusing on the application of big data visualization
technology in auditing. With the help of visualization, the audit data is mined, and the deeper
connotation of the audit data is visually displayed, thus improving audit efficiency and work quality.
Second, the visualization method based on a deep confidence network to extract data features is
selected for big data audit technology. Finally, based on the pre-processing of big data under the
financial shared service model, the flow of big data is analyzed. Develop the implementation process
of big data auditing based on the financial shared service model. Apply the visualization and analysis
techniques of big data to audit and analyze SOE B.

2 Big Data Audit

Big data auditing is a new type of auditing method developed on the basis of big data technology. Big
data auditing mainly refers to the auditors’ use of big data resources to find the connection between
big data and audited units and verify the legality and compliance of their economic activities through
big data methods.

The process framework of big data audit is big data collection, big data processing, big data analysis,
and finding audit suspicion and audit evidence through the collection and processing of data and
analysis.

2.1 Rationale for the Application of big data technology in Auditing

In the big data audit environment, data mining methods such as cluster analysis, correlation analysis,
and time series analysis are important for auditing work because they can be used to build audit ideas
based on these data mining algorithms, help auditors drill down into audit data, find audit suspicions,
and improve the efficiency of auditing. At present, as the financial revenue and expenditure audit is
inclined to the “problem-oriented” audit approach, the audit task is positioned on abnormal and
suspicious data, while big data audit is to dig out useful, implicit and unknown information from a
large amount of irregular data, and start from this information to examine the authenticity, accuracy
and reliability of the financial revenue and expenditure activities of the audited unit.

Big data auditing is to dig out useful, implicit and unknown information from a large amount of
irregular data and to examine the authenticity, legality and compliance of the audited unit’s financial
revenue and expenditure activities from this information. The principle of the application of big data
technology in the audit business is shown in Figure 1 below. Starting from the original data of the
audited unit, a large amount of audit data is collected and acquired, and processed, with data
processing methods such as data screening, cleaning, integration and conversion. Then, the methods
of big data technology, such as cluster analysis and correlation analysis, are used to reveal the hidden
trends, patterns and characteristics of the data. Then, auditors combine their professional judgment to
count the information mined from the data and identify abnormal data, which is the focus of audit
work and an important result of mining technology. Finally, the auditors further analyze and process
the abnormal data and combine it with predictive analysis to arrive at the final identified issues and
audit opinions.
4 Xiaoyun Yan. Applied Mathematics and Nonlinear Sciences, 9(1) (2024) 1-14

Raw Data

Data Acquisition

Data processing (data filtering, cleaning, integration, conversion)

Data analysis (Cluster analysis, series analysis)

Analysis of abnormal data, data trends,


patterns

Audit Conclusions and


Recommendations

Figure 1. Principle of applying big data technology in the audit business

2.2 Application of Big Data Visualization Technology in Auditing

In the field of auditing, the audit data collected in the big data environment is huge in quantity and
complex in a relationship. Traditional audit technology methods are not easy to discover the
correlation logic existing between data, and the efficiency of auditors is limited. Therefore, in order
to cope with and solve the dilemma and potential risks faced by electronic data analysis, the
development and application of big data visualization techniques are urgent.

The purpose of applying big data visualization technology in auditing work is to mine audit data with
the help of visualization, intuitively show the deep connotation of audit data, summarize the overall
law of audit data, and then improve audit efficiency and work quality.

In this paper, we propose a visualization method based on a deep confidence network to extract data
features. The DBN network is trained on the audit data, and the DBN-based method is used to extract
the data feature values and present the feature results after dimensionality reduction processing.

2.2.1 DBN Network Structure

DBN network is a multilayer perceptron neural network formed by RBM stacking. In this paper, the
classical three-layer RBM stacked DBN network is used. The DBN network structure is shown in
Figure 2.
Research on big data audit based on financial shared service model 5

Output of extracted deep features

BP

RBM3

RBM2

RBM1

Turnout power raw data

Figure 2. DBN network structure

2.2.2 DBN network training process

The training process of the DBN network includes unsupervised pre-training of each layer of the
RBM and supervised fine-tuning. The structure of the RBM. The RBM network structure is shown
in Figure 3.

h1 h2 hn
Implicit
b2 b3 bn layer

Wnm

c1 c2 c3 cm Visual
layer
v1 v2 v3 vm

Figure 3. RBM network structure

m, n is the number of nodes in the visible and implicit layers, respectively, and the inter-layer weight
matrix is W  R nm .

The visual layer state vector:

v = ( v1 , v2 vi vm )  R m1


T
(1)
6 Xiaoyun Yan. Applied Mathematics and Nonlinear Sciences, 9(1) (2024) 1-14

Visible layer paranoia vector:

c = ( c1 , c2 ci cm )  R m1


T
(2)

Implicit layer state vector:

h = ( h1 , h2  h j  hn )  R n1
T
(3)

Implicit layer paranoid vectors:

b = ( b1 , b2 b j bn )  R n1
T
(4)

RBM is an energy-based model with an energy function for a given set of turnout states (v, h) as

n m n m
E (v, h) = − ci vi −  b j h j −  h j w ji vi (5)
i =1 j =1 i =1 j =1

 is the parameter of the RBM {W , c, b} , transformed into matrix form:

E (v, h) = −cT v − bT h − hTWv (6)

Translating the energy function into the joint probability distribution for turnout state (v, h) :

1 − E ( v ,h )
P (v, h) = e (7)
Z

Among them:

Z =  e − E ( v ,h ) (8)
v ,h

is called the normalization factor, also known as the collocation function.

For practical problems, we are often concerned with the marginal probability distribution P (v) of
the input raw data v , also called the likelihood function.

1
P (v) =  P (v, h) = e − E ( v , h )
(9)
h Z h

Idem:

1
P (h) =  P (v, h) = e − E ( v , h )
(10)
v Z v

The joint probability P (v, h) and marginal probability P (v), P (h) are known, and according to
Bayes’ formula, the conditional probability can be found as follows:
Research on big data audit based on financial shared service model 7

 m 
P ( h j = 1| v ) =    w ji vi + b j  (11)
 i =1 

 n 
P ( vi = 1| h ) =    w ji h j + ci  (12)
 j =1 

Which refers to the activation function using the sigmoid function.


If the training sample consisting of the power raw data of the turnout is: S = v1 , v 2  v ns , where  ns
refers to the number of training samples, vl = ( v1l , v2l vml ) , l = 1, 2 ns . For any sample v l in S , the
maximum likelihood function is

L , S = P v l( ) (13)

To facilitate the solution, both sides are taken logarithmically:

ln L , S = ln P vl ( ) (14)

The ultimate goal of training the RBM is to obtain parameter  = w ji , c, b and then use  to update
the three parameters of the network. Taking the solution of w ji as an example, the gradient descent
method is used to find:

 ln L , S
=
 ln P v l( ) (15)
 

Further find:

 ln L , S
w ji
( )
= P h j = 1| vl vil −  P(v) P h j = 1| vl vi ( ) (16)
v

Since the second term in equation (16) is too large for direct calculation, the k -step comparison
scattering algorithm is used to find its approximate value.

Using the two conditional probabilities in (11) and (12) for Gibbs sampling at step t , respectively,
one can find: h(t −1) and v , t = 1,2k . Using v k obtained by sampling at step k to approximate the
t

expectation term in the second term in equation (16), one thus finds:

 ln P vl ( )P
w ji
(h j ) ( )
= 1| vl vil − P h j = 1| v k vik (17)

w ji is then updated using equation (17):


8 Xiaoyun Yan. Applied Mathematics and Nonlinear Sciences, 9(1) (2024) 1-14

w ji = w ji +
( )
 ln P vl
(18)
w ji

Similarly, the update process of parameters ci and b j is similar to that of w ji , and will not be further
described. In summary, the training process of parameter update for RBM consists of five main steps.

1) The raw data v is normalized and input to the visual layer v1 of the first RBM layer, and the
weights and bias parameters between v1 and h1 are trained and adjusted to derive the
probability P ( v | h1 ) of h1 being on.

2) Determine the number of network layers and initialize the weights and biases of the RBM
layers.

3) Reconstruct v2 with h1 as the input to the second RBM layer. As in step 1, train and adjust
the weights and bias parameters between v2 and h2 and derive the probability P ( h2 | h1 ) of
h2 being on.

4) Repeat steps 1 and 2 until the first two layers of RBM pre-training are completed, at which
point the unsupervised feature learning process is complete.

5) Add the sample label data y to h2 and reconstruct v3 with ( y, h2 ) as the input of the third
RBM layer, and use the BP algorithm to fine-tune the weights and biases of each layer of the
whole network in reverse, and supervised learning completes the training of the whole DBN
network.

3 Big data audit based on financial shared services model

3.1 Financial Shared Services Model

Financial shared services are a business model based on the deep optimization of the financial
organization of an enterprise. It mainly uses information technology to standardize the management
of financial and business processes to improve process efficiency, reduce operating costs, create
company value, and provide professional products and services for internal and external customers.
At the same time, it can realize centralized and unified management and collaborative work, which
helps to reduce the adverse effects of independence. Through resource sharing and information
interaction, it enables companies to grasp each other’s situation in real-time and adjust their strategies
in response to risks. The information platform supports communication and cooperation between
enterprises, realizes information data sharing, and thus realizes the strategic development goals of
enterprises. Therefore, incorporating financial sharing into the entire business chain of a company
and giving full play to the advantages of financial sharing can achieve a win-win situation.

3.1.1 Financial sharing model

Under the development of financial shared service theory and other related practical theories, four
financial sharing models have been gradually formed. They mainly include the basic model, market
model, advanced market model and independent operating model. The main characteristics of each
Research on big data audit based on financial shared service model 9

model of financial sharing are shown in Table 1.

Table 1. Table of financial sharing models


Mode Features
Basic Model Focus on rationalizing the division of labor among employees and setting rules
Establishment of professional financial decision-making advisory and consulting
Market Model
services
The financial sharing center is more outward-oriented and chooses its own financial
Advanced Market Model
management service model that suits the characteristics and scale of the enterprise
Independent business model Financial Sharing Center becomes a fully self-sufficient business entity

3.1.2 Architecture of Financial Shared Services

The financial sharing service consists of three levels, the strategic finance center, the business finance
center, and the sharing center. The financial strategy center is responsible for the overall strategy of
the company, including financial audit and financial decision-making. The staff is mainly centered on
senior financial decision makers; the business finance center is responsible for internal control,
financial analysis, and budgeting to ensure that finance provides strong support for the business
activities of the company: the sharing center undertakes various basic tasks such as corporate financial
accounting, file management, and financial statement preparation. The financial shared service
architecture flow is shown in Figure 4.

Strategic Finance
Center

Communication Support
Guidance

Guidance

Support
Business Finance
Shared Center
Center
Communication

Figure 4. Financial Shared Services Architecture

3.2 Big data pre-processing based on financial shared services model

Before executing the Big Data audit process, Big Data needs to be pre-processed. Big data pre-
processing includes data collection, data cleaning and data storage. Figure 5 shows the flow chart of
big data pre-processing based on the financial shared service model. The core of the financial shared
service model lies in the establishment of a financial shared service center, and the financial shared
service center also needs the support network of information systems. Therefore, under the financial
shared service model, it is necessary to establish a workflow platform system for the financial shared
service center of the enterprise group, i.e., a cloud platform system. The cloud platform system can
not only realize the centralization, standardization and unification of accounting. It can also smoothly
10 Xiaoyun Yan. Applied Mathematics and Nonlinear Sciences, 9(1) (2024) 1-14

connect the internal business system with the financial system and realize the internal and external
connection of the enterprise.

Big Data Big Data Audit Data


Big Data Storage
Collection Cleaning Warehouse

Figure 5. Big data pre-processing flow chart

3.3 Financial Big Data Audit Implementation Process

After the pre-processing of big data, auditors need to implement the audit work specifically. This
paper constructs a big data audit implementation process based on the financial shared service model,
and the big data audit implementation flow chart based on the financial shared service model is shown
in Figure 6. In general, the goal of big data audit based on the financial service sharing model is to
audit the authenticity, reliability, validity and security of enterprise big data. Auditing the authenticity
and reliability of big data is mainly to audit the source and processing process of data and express an
audit opinion. The audit of the validity of big data is to audit and express an audit opinion on the
effectiveness of the data in supporting the decision-making of information users. Auditing the security
of big data is to audit and express an audit opinion on the security of the flow of big data to the
enterprise.

In specific audit operations, the audit should set specific audit objectives based on different directions
and targets. From the perspective of the audit performer, big data audits based on the financial shared
service model can be conducted both internally and externally. From the perspective of the audit
object, both business and cloud platform systems can be audited. If it is auditing the specific business
of the audited object, the goal is business process compliance and effective and full and reasonable
utilization of resources. If the cloud platform system is audited, the goal is to determine the reliability
and validity of the system and whether the audit system can provide useful information to information
users.

Set audit objectives

Identify and assess


risks

Develop an audit
plan

Execute the audit


plan

Issuing audit reports

Figure 6. Big data audit implementation flow chart


Research on big data audit based on financial shared service model 11

4 Empirical study of financial big data auditing

4.1 Analysis of abnormal transactions based on big financial data

The visualization and analysis of big data take human needs as the goal of the analysis. Through a
simple and intuitive presentation model, the data and results are more easily and clearly accepted by
people, and the complex and difficult-to-understand massive data is intuitively displayed with the
help of visualization technology. The visualization tools are used to model and input the audited big
data, followed by outputting the results. Auditors use their own expertise to observe and simply
analyze the output results and analyze the data’s connotative features and even correlations on a macro
level. Both the corresponding audit trail can be found to further explore the audit evidence, and
feedback on the modeling based on the visualized results can be provided.

In the process of risk assessment of the audited entity SOE B, it is necessary to understand internal
information, such as the operating and financial status of the audited entity, as well as external
information, such as the industry status and regulatory environment of the audited entity, while the
understanding of the strategic objectives and operational risks of the audited entity also helps auditors
to identify areas with higher risks of material misstatement.

The data on the percentage of each revenue of SOE B is shown in Figure 7. A comparison of the
information within the figure reveals that SOE B’s overall growth in trade revenue in 2017 has
reached 39%, and the share of trade revenue has reached as high as 83.1%. Among them, the revenue
growth of chemical products is the most obvious again, and while the revenue of chemical products
has doubled, its already low gross margin has dropped by 0.67%.

Figure 7. SOE B data by revenue share

4.2 Big Data Visual Analytics Technology Implementation Audit Analysis

Big data visualization technology helps auditors to quickly pinpoint audit suspicions from big data
by graphically conveying and communicating information clearly and effectively, thus making big
data visualization an inevitable way for warranties auditing. This section examines the audit method
based on big data visualization technology.
12 Xiaoyun Yan. Applied Mathematics and Nonlinear Sciences, 9(1) (2024) 1-14

Auditors ask relevant responsible persons about the development of systems related to enterprise
development strategic planning, the effectiveness of implementation and the variance analysis
dynamic working mechanism of planning expectations. To determine the factors influencing the
implementation of strategic planning, the auditors analyze the financial statements collected to
analyze the implementation of the enterprise development strategic plan.

The consolidated financial statements for FY 2017 and FY 2021 show that the main financial
indicators of State-owned Enterprise B have increased significantly by the end of 2020. Specific data
on the financial position of State-owned Enterprise B are shown in Table 2. The business has grown
significantly, and economic efficiency has improved significantly. Assets, liabilities and owner’s
equity all showed growth. In addition, operating income also showed an increasing trend. The main
reason is that SOE B and its subsidiaries increased market development efforts and actively developed
the stock market, achieving substantial growth in sales volume. Profit before tax and net profit showed
an increasing trend. The net profit for the year increased by 153.17% compared with that of the
previous year. This was mainly due to the efforts of SOE B to reduce non-production operating
expenses and expenses while maintaining a significant increase in sales volume.

Table 2. Specific data on the financial situation of SOE B


Value at the end of 2017 Value at the end of 2021 Growth value of (million
Statement Items
(RMB million) (million yuan) yuan)
Total Assets 58418 167689 101175
Total liabilities 48552 150921 95431
Owner’s Equity 7831 16055 9583
Operating Income 18492 58941 41432
Net Profit 793 2010 1221
ROE Value (%) 11.43% 12.27% 1.23%

Statistical data on the share of operating income of state-owned enterprise B are shown in Figure 8.
Based on the performance contracts issued by the superiors during the term, the auditors complied
with the selected revenue indicators related to the financial responsibility of the enterprise leaders to
verify the completion of the performance assessment indicators. The analysis of the revenue share of
the business of state-owned enterprise B shows that the highest revenue contribution is made by the
business of construction on behalf of the enterprise. The analysis results show that the revenue of the
business of construction on behalf of state-owned enterprise S from 2017 to 2021 accounted for
84.71%, 88.16%, 92.44%, 78.42%, and 96.04% of the revenue of that year, respectively. The
proportion of the revenue of state-owned enterprises B substitute construction engineering business
in the current year increases slightly year by year, and the proportion decreases significantly in 2019
and resumes rapid growth in 2021.
Research on big data audit based on financial shared service model 13

Figure 8. Share of operating income of state-owned enterprise B

5 Conclusion

This paper implements audit analysis based on big data visualization technology under the financial
shared service model. Auditors analyze the collected financial statements and analyze the
implementation of strategic planning for enterprise development. In the process of risk assessment of
the audited unit, State-owned Enterprise B, it is concluded that State-owned Enterprise B’s operation
business has gained significant development, and economic efficiency has improved significantly.
Assets, liabilities, and owner’s equity all showed an increasing trend. In addition, operating income
also showed a growth trend. The consolidated financial statements for FY2017 and FY2021 showed
that the main financial indicators of SOE B had increased significantly by the end of 2020.

References
[1] Raudeliuniene, J., Albats, E., & Kordab, M. (2020). Impact of information technologies and social
networks on knowledge management processes in middle eastern audit and consulting companies. Journal
of Knowledge Management, ahead-of-print(ahead-of-print).
[2] Van, Eerd, Dwayne, Hogg-Johnson, Sheilah, & Ibrahim, et al. (2017). Developing leading indicators from
ohs management audit data: determining the measurement properties of audit data from the field. Journal
of Safety Research.
[3] Haviari, S., Chollet, F., Polazzi, S., Payet, C., Beauveil, A., & Colin, C., et al. (2018). Effect of data
validation audit on hospital mortality ranking and pay for performance. BMJ quality & safety, 28.
[4] Kacer, M., Peel, D. A., Peel, M. J., & Wilson, N. (2018). On the persistence and dynamics of big 4 real
audit fees: evidence from the uk. Journal of Business Finance & Accounting.
[5] Cooke, L. J., Duncan, D., Rivera, L., Dowling, S. K., Symonds, C., & Armson, H. (2018). How do
physicians behave when they participate in audit and feedback activities in a group with their peers?.
Implementation Science, 13(1).
[6] Defond, M., Erkens, D. H., & Zhang, J. (2017). Do client characteristics really drive the big n audit quality
effect? new evidence from propensity score matching. Management Science, 63.
14 Xiaoyun Yan. Applied Mathematics and Nonlinear Sciences, 9(1) (2024) 1-14

[7] Sajan, P., Alvin, R., Harrison, J. D., Prasad, P. A., Victoria, V., & Ranji, S. R., et al. (2018). Next-
generation audit and feedback for inpatient quality improvement using electronic health record data: a
cluster randomised controlled trial. Bmj Quality & Safety, 27(9), 691-699.
[8] Salijeni, G., Samsonova-Taddei, A., & Turley, S. (2021). Understanding how big data technologies
reconfigure the nature and organization of financial statement audits: a sociomaterial analysis. European
Accounting Review(2).
[9] Tupikovskaja-Omovie, Z., & Tyler, D. (2020). Eye tracking technology to audit google analytics:
analysing digital consumer shopping journey in fashion m-retail. International Journal of Information
Management.
[10] Appelbaum, D., Showalter, D. S., Sun, T. S., & Vasarhelyi, M. A. (2020). A framework for auditor data
literacy: a normative position. Accounting Horizons.
[11] Holt, T., & Loraas, T. M. (2021). A potential unintended consequence of “big data”: does information
structure lead to suboptimal auditor judgment and decision-making?. Accounting Horizons.
[12] Kend, M., & Nguyen, L. A. (2020). Big data analytics and other emerging technologies: the impact on
the australian audit and assurance profession. Australian Accounting Review(1).
[13] Smidt, L., Ahmi, A., Steenkamp, L., Nest, D., & Lubbe, D. (2019). A Maturity-level Assessment of
Generalised Audit Software: Internal Audit Functions in Australia. Australian Accounting Review, 29.
[14] Kogan, A., Mayhew, B. W., & Vasarhelyi, M. A. (2019). Audit data analytics research - an application of
design science methodology. Accounting Horizons, 33(3).
[15] Sandra, R. (2017). Getting started in audit and research: project design and data collectioni32. getting
started in audit and research: project design and data collection. Rheumatology(suppl_2), suppl_2.
[16] Minuk, L., Callum, J., Tinmouth, A. T., Skeate, R., & Liu, Y. (2019). Identifying patterns of inappropriate
plasma transfusion practices using a novel multicenter electronic data audit: over 80 percent of plasma
transfused is inappropriate. Blood, 134(Supplement_1), 3695-3695.
[17] Broeders, D., Schrijvers, E., Sloot, B., Brakel, R. V., Hoog, J. D., & Ballin, E. H. (2017). Big data and
security policies: towards a framework for regulating the phases of analytics and use of big data. Computer
Law & Security Review.
[18] Beau, P., & Jerman, L. (2022). Bonding forged in “auditing hell”: the emotional qualities of big four
auditors. CRITICAL PERSPECTIVES ON ACCOUNTING, 83.
[19] Kontokosta, C. E., Reina, V. J., & Bonczak, B. (2019). Energy cost burdens for low-income and minority
households: evidence from energy benchmarking and audit data in five u.s. cities. Journal of the American
Planning Association, 86(1), 1-17.
[20] Hobbs, N., Touqan, N., & Williams, K. (2021). 791using audit data to inform and guide covid-19
recovery: a case for the re-introduction of immediate breast cancer reconstructions. British Journal of
Surgery (Supplement_2), Supplement_2.
[21] Ledingham, & Jo. (2019). I005?using audit data to transform services. Rheumatology (Oxford, England).

About the Author

Xiaoyun Yan, Male (1973.09-), Han Nationality, Ganzhou City, Jiangxi Province, B.S., Associate
Professor. Research Interests: Auditing, Fiscal Performance.

You might also like