Active Anomaly Detection for Key Item Selection in Process Auditing

5Citations
Citations of this article
12Readers
Mendeley users who have this article in their library.

Abstract

Process mining allows auditors to retrieve crucial information about transactions by analysing the process data of a client. We propose an approach that supports the identification of unusual or unexpected transactions, also referred to as exceptions. These exceptions can be selected by auditors as “key items”, meaning the auditors wants to look further into the underlying documentation of the transaction. The approach encodes the traces, assigns an anomaly score to each trace, and uses the domain knowledge of auditors to update the assigned anomaly scores through active anomaly detection. The approach is evaluated with three groups of auditors over three cycles. The results of the evaluation indicate that the approach has the potential to support the decision-making process of auditors. Although auditors still need to make a manual selection of key items, they are able to better substantiate this selection. As such, our research can be seen as a step forward with respect to the usage of anomaly detection and data analysis in process auditing.

Cite

CITATION STYLE

APA

Post, R., Beerepoot, I., Lu, X., Kas, S., Wiewel, S., Koopman, A., & Reijers, H. (2022). Active Anomaly Detection for Key Item Selection in Process Auditing. In Lecture Notes in Business Information Processing (Vol. 433 LNBIP, pp. 167–179). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-030-98581-3_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free