Information Fusion in Continuous Assurance Discussed by Dr. Graham Gal University of Massachusetts at Amherst University of Waterloo Conference on Information.

Slides:



Advertisements
Similar presentations
Assessment I. Outline Select a paper of interest Not a thought piece or a review Empirical research Get paper approved Produce 2,000 word report.
Advertisements

1 Trust Evidence in Heterogeneous Environments: Towards a Research Agenda Ravi Sandhu Executive Director and Endowed Professor May 2010
1 Trust Evidence in Heterogeneous Environments: Towards a Research Agenda Ravi Sandhu Executive Director and Endowed Professor May 2010
The Sales/Collection Business Process
Standardized Scales.
Business Processes, Data Modeling and Information Systems
The Influence of Internal Audit on Information Security Effectiveness October 5, 2013 Perceptions of Internal Auditors Graham Gal With Paul Steinbart,
EECE499 Computers and Nuclear Energy Electrical and Computer Eng Howard University Dr. Charles Kim Fall 2013 Webpage:
Process Patterns in BizAGI. Slide 2 Overview Types of events Types of gateways Design patterns list.
Modeling Human Reasoning About Meta-Information Presented By: Scott Langevin Jingsong Wang.
Inside View of DDI Version 3.0: Structural Reform Group Report Presented to IASSIST 25 May 2005 Edinburgh Scotland UK.
The Impact of Information Technology Material Weaknesses on Corporate Governance: Evidence from Executive and Director Turnover, and IT Governance Changes.
Semantic Specification and Automated Enforcement of Internal Controls within Accounting Systems Dr. Graham Gal University of Massachusetts at Amherst Dr.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
A Data Fusion Approach for Power Saving in Wireless Sensor Networks Reporter : Chi-You Chen.
IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESS
Evaluating a Scientific Paper. Organization 1.Title 2. Summary or Abstract 4. Material and Methods 5. Results 6. Discussion and Conclusions 7. Bibliography.
A semantic learning for content- based image retrieval using analytical hierarchy process Speaker : Kun Hsiang.
Internal Control in a Financial Statement Audit
The Effects of Different Land Uses in Missouri on Local Fiscal Conditions – Cost of Community Services Project Update – 4/12/02.
Critique of Research Outlines: 1. Research Problem. 2. Literature Review. 3. Theoretical Framework. 4. Variables. 5. Hypotheses. 6. Design. 7. Sample.
Educational Research: Action Research in Schools
BRITISH CONSTITUTION PRACTICE PAPER ANSWERS JUNE 2014.
Maximize Data Quality Text Box Field Types l Restrict the use of undefined (un- validated) text boxes n Create a list of appropriate choices using the.
What is it? A mobile robotics system controls a manned or partially manned vehicle-car, submarine, space vehicle | Website for Students.
Barriers towards the inclusive design of tourism Tomomi Wakiya Dr Graham Miller Prof. John Tribe University of Surrey, UK.
ATTC Network Evaluation 1 National Evaluation of the Addiction Technology Transfer Center (ATTC) Network: ATTC Event & Activity Reporting Database Review.
Dr. István Fekete: The Role of Integrated Risk Management in Organizations April11th, Budapest.
Commercial Database Applications Testing. Test Plan Testing Strategy Testing Planning Testing Design (covered in other modules) Unit Testing (covered.
Information Fusion in Continuous Assurance Johan Perols University of San Diego Uday Murthy University of South Florida UWCISA Symposium October 2, 2009.
REAL-TIME SOFTWARE SYSTEMS DEVELOPMENT Instructor: Dr. Hany H. Ammar Dept. of Computer Science and Electrical Engineering, WVU.
Chapter 8 Architecture Analysis. 8 – Architecture Analysis 8.1 Analysis Techniques 8.2 Quantitative Analysis  Performance Views  Performance.
SynGenics Corporation 72 E Granville Road Worthington OH ©2003 SynGenics Corporation. All rights reserved. The Use.
An Approach to Correctness of Security and Operational Business Policies October 5, 2013 Discussant Graham Gal.
TR 07- FI- 02 INTERNAL CONTROL Basic Course - MONITORING build in from the start January 2010 EU Twinning Project TR 07-FI-02.
Internal Control in a Financial Statement Audit
EVALUATING PAPERS KMS quality- Impact on Competitive Advantage Proceedings of the 41 st Hawaii International Conference on System Sciences
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Interviewing and Deception Detection Techniques for Rapid Screening and Credibility Assessment Dr. Jay F. Nunamaker, Jr. Dr. Judee K. Burgoon.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks The network monitoring in grid context Operations.
Integrating Knowledge Translation and Exchange into a grant Maureen Dobbins, RN, PhD SON, January 14, 2013.
International Conference on Machine Learning and Cybernetics, Vol. 1, p.p July, Research on a Fuzzy Multi-Objective Decision Model.
Distributed Monitoring and Aggregation in Wireless Sensor Networks INFOCOM 2010 Changlei Liu and Guohong Cao Speaker: Wun-Cheng Li.
Enterprise Risk Management Chapter One Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
Copyright © 2010 National Institute of Information and Communications Technology. All Rights Reserved 1 R&D and Standardization Activities on Distributed.
Potential Errors In Epidemiologic Studies Bias Dr. Sherine Shawky III.
School of Biomedical Engineering, Science and Health Systems APPLICATION OF WAVELET BASED FUSION TECHNIQUES TO PHYSIOLOGICAL MONITORING Han C. Ryoo, Leonid.
REAL-TIME SOFTWARE SYSTEMS DEVELOPMENT Instructor: Dr. Hany H. Ammar Dept. of Computer Science and Electrical Engineering, WVU.
15–1 What Is Planning? Planning Planning is choosing a goal and developing a strategy to achieve that goal.
NEW SOUTH WALES TECHNICAL AND FURTHER EDUCATION COMMISSION 17136Q Marketing simulation SYLLABUS 5-Jan-2009.
K. Kolomvatsos 1, C. Anagnostopoulos 2, and S. Hadjiefthymiades 1 An Efficient Environmental Monitoring System adopting Data Fusion, Prediction & Fuzzy.
1 Makes Mobile WiMAX Simple Netspan Overview Andy Hobbs Director, Product Management 5 th October 2007.
Co-operative Training in Classifier Ensembles Rozita Dara PAMI Lab University of Waterloo.
Governance Indicators at AfDB Stephen Bahemuka May, 2012 African Development Bank.
 An Information System (IS) is a collection of interrelated components that collect, process, store, and provide as output the information needed to.
Wireless Network Management SANDEEP. Network Management Network management is a service that employs a variety of tools, applications, and devices to.
1 Software Testing and Quality Assurance Lecture 17 - Test Analysis & Design Models (Chapter 4, A Practical Guide to Testing Object-Oriented Software)
Learning Objectives Copyright © 2002 South-Western/Thomson Learning Communicating the Research Results CHAPTER eighteen.
The Use of Actuaries as Part of a Supervisory Model Michael Hafeman – Consultant World Bank May 2004.
Ing-Ray Chen, Member, IEEE, Hamid Al-Hamadi Haili Dong Secure and Reliable Multisource Multipath Routing in Clustered Wireless Sensor Networks 1.
Chapter 6 Internal Control in a Financial Statement Audit McGraw-Hill/IrwinCopyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
Multiplication table. x
Annual Professional Development Conference
Libraries are in challenging times
The Influence of Internal Audit on Information Security Effectiveness
Department of Computer Science Old Dominion University
Take Control Over Underwriting Quality and Leakage
Unit 2: Fundamentals of Computer Systems
Overview Activities from additional UP disciplines are needed to bring a system into being Implementation Testing Deployment Configuration and change management.
CDM Activity Cycle under the Marrakech Accords
Presentation transcript:

Information Fusion in Continuous Assurance Discussed by Dr. Graham Gal University of Massachusetts at Amherst University of Waterloo Conference on Information Systems Assurance October 1-3, 2009

Previous Sensor Fusion Research – Multi-Sensor Environments – Information Systems Layers of fusion hierarchy Implications for Research Presentation Outline University of Waterloo Conference on Information Systems Assurance October 1-3, 2009

Multi-Sensors University of Waterloo Conference on Information Systems Assurance October 1-3, 2009

Different reliability rates – Failure rates – False alarms Interpreting data and making a decision – Fire a missile – Do not Problem of data from sensors October 1-3, 2009 University of Waterloo Conference on Information Systems Assurance

Processes p x Multiple Monitoring points or modules – m 1.. m k – Reliability rates – Importance of different monitoring points Decision – In control – Not in control – Collect more data Continuous Assurance Problem October 1-3, 2009 University of Waterloo Conference on Information Systems Assurance

Monitoring Layer Exceptions Credit Sales Process p x Process Exceptions e p e p e p Monitoring Module Exceptions e m e m e m or e mj e mj e mj October 1-3, 2009 University of Waterloo Conference on Information Systems Assurance

Information and Exceptions – Aggregations on objects – i m should probably be i mo Level 3 exceptions are across the REA Duality Data Aggregation Layer October 1-3, 2009 University of Waterloo Conference on Information Systems Assurance

Level 3 exceptions – Separation of duties at Type or Instance level – Type level specification occurs at design time – Binding of instances to types is a run time issue Level 5 exceptions – Roles for event types are specified at design time – Database operations would be as well Design of sales processing includes base tables to be changed Data Aggregation Layer October 1-3, 2009 University of Waterloo Conference on Information Systems Assurance

Design, Test, and Production Processes – Production processes can change base table information – Design and test processes impact the execution of Production processes – Monitoring must also occur on these processes Inclusion of more Processes October 1-3, 2009 University of Waterloo Conference on Information Systems Assurance

Object Evaluation versus Decision Making – Object evaluation result in O x or P x state – Decision Making layer aggregates across the P and O to come to an overall evaluation – Problem of subjective evaluation of materiality of control issues What does 3% of weakness of IC system mean? – Previous fusion research was based on sensors with know reliability rates Evaluation Layers October 1-3, 2009 University of Waterloo Conference on Information Systems Assurance

Presents a description of activities that must be performed in making a determination of the overall state of the system The paper makes a clear distinction of what activities occur at various levels and the data that is provided at these levels Researchers and practitioners have a ways to go to understand how to reduce alarm rates (only raise “real” exceptions) and how to integrate the exceptions Conclusion October 1-3, 2009 University of Waterloo Conference on Information Systems Assurance