Pub Date : 2025-06-23DOI: 10.1016/j.accinf.2025.100752
Michel Benaroch
Auditing IT general controls (ITGC) for Sarbanes-Oxley (SOX) compliance is challenging because all ITGCs are presumed to be pervasive and in need of detailed testing. However, some ITGCs are more pervasive than others and have a greater impact on financial reporting. We developed a network model of ITGCs embedded in a system of enterprise information systems (IS) processes and used network centrality metrics to score the pervasiveness of an ITGC based on its connectivity and its implied disruptive influence on the information flow needed for the IS process system to function as intended. We tested our pervasiveness scores by examining the equity market reactions to revelations of specific ITGC deficiencies that led to cyber incidents (e.g., data breaches, cyberattacks). We found a direct relationship between ITGC pervasiveness and equity market reactions, suggesting that equity market participants attach greater value-relevance to more pervasive ITGCs. Our pervasiveness scores also explained equity market reactions better than the “priority” scores senior IT auditors assign to testing (auditing) specific ITGCs based on their importance to SOX compliance. Our findings are robust and hold for 17-day event windows and for the pre- and post-SOX periods.
{"title":"Measuring the pervasiveness of IT general controls: A model and empirical validation","authors":"Michel Benaroch","doi":"10.1016/j.accinf.2025.100752","DOIUrl":"10.1016/j.accinf.2025.100752","url":null,"abstract":"<div><div>Auditing IT general controls (ITGC) for Sarbanes-Oxley (SOX) compliance is challenging because all ITGCs are presumed to be pervasive and in need of detailed testing. However, some ITGCs are more pervasive than others and have a greater impact on financial reporting. We developed a network model of ITGCs embedded in a system of enterprise information systems (IS) processes and used network centrality metrics to score the pervasiveness of an ITGC based on its connectivity and its implied disruptive influence on the information flow needed for the IS process system to function as intended. We tested our pervasiveness scores by examining the equity market reactions to revelations of specific ITGC deficiencies that led to cyber incidents (e.g., data breaches, cyberattacks). We found a direct relationship between ITGC pervasiveness and equity market reactions, suggesting that equity market participants attach greater value-relevance to more pervasive ITGCs. Our pervasiveness scores also explained equity market reactions better than the “priority” scores senior IT auditors assign to testing (auditing) specific ITGCs based on their importance to SOX compliance. Our findings are robust and hold for 17-day event windows and for the pre- and post-SOX periods.</div></div>","PeriodicalId":47170,"journal":{"name":"International Journal of Accounting Information Systems","volume":"56 ","pages":"Article 100752"},"PeriodicalIF":4.1,"publicationDate":"2025-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144364949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-06-05DOI: 10.1016/j.accinf.2025.100749
Nida Türegün
This study analyzes the impact of integrating cybersecurity measures on the financial performance of banks. Utilizing regression analysis with data from 100 financial institutions, the findings reveal that banks prioritizing cybersecurity perform better financially. This study demonstrates that it is the quality and strategic integration of cybersecurity measures, as revealed through disclosures, that significantly influence financial outcomes, rather than the sheer scale of investment. A subsample analysis suggests that larger banks appear more resilient to cybersecurity threats due to scale-related advantages, while smaller banks can also improve their financial performance by adopting proportionate, strategically aligned cybersecurity measures. Effective cybersecurity integration correlates with improved financial metrics such as return on assets and equity. Furthermore, the severity of cybersecurity incidents negatively impacts financial performance, emphasizing the importance of proactive risk management. This study underscores the critical role of cybersecurity in financial strategy, enabling banks to navigate digital transformation challenges effectively.
{"title":"Digital transformation and cybersecurity risks","authors":"Nida Türegün","doi":"10.1016/j.accinf.2025.100749","DOIUrl":"10.1016/j.accinf.2025.100749","url":null,"abstract":"<div><div>This study analyzes the impact of integrating cybersecurity measures on the financial performance of banks. Utilizing regression analysis with data from 100 financial institutions, the findings reveal that banks prioritizing cybersecurity perform better financially. This study demonstrates that it is the quality and strategic integration of cybersecurity measures, as revealed through disclosures, that significantly influence financial outcomes, rather than the sheer scale of investment. A subsample analysis suggests that larger banks appear more resilient to cybersecurity threats due to scale-related advantages<strong>,</strong> while smaller banks can also improve their financial performance by adopting proportionate, strategically aligned cybersecurity measures. Effective cybersecurity integration correlates with improved financial metrics such as return on assets and equity. Furthermore, the severity of cybersecurity incidents negatively impacts financial performance, emphasizing the importance of proactive risk management. This study underscores the critical role of cybersecurity in financial strategy, enabling banks to navigate digital transformation challenges effectively.</div></div>","PeriodicalId":47170,"journal":{"name":"International Journal of Accounting Information Systems","volume":"56 ","pages":"Article 100749"},"PeriodicalIF":4.1,"publicationDate":"2025-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144212226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-06-05DOI: 10.1016/j.accinf.2025.100748
Lazarus Elad Fotoh , Tatenda Mugwira
This study explores the impact of Large Language Models (LLMs) on external audits and their associated ethical implications. A small-scale survey was conducted with auditors from non-Big Four firms to assess their general perceptions of LLMs, followed by a qualitative evaluation of external LLMs in audit-specific tasks. In the latter, ChatGPT’s responses to audit-related scenarios were assessed by experienced audit partners, who rated and commented on the outputs without knowing their source. The findings indicate that while LLMs efficiently perform routine and mundane tasks such as generating human-like responses and preparing basic audit working papers and reports, external LLMs struggle to produce comprehensive, audit-specific reports. Non-Big Four auditors recognise LLMs’ time-saving potential and relevance in audit planning; however, concerns persist regarding the comprehensiveness and contextual relevance of external LLM-generated risk assessments and interpretations of auditing standards. Moreover, limitations inherent in external LLMs, such as outdated information and hallucinations, necessitate auditor oversight. Ethical concerns identified include threats to auditor objectivity, confidentiality, privacy, accountability, and intellectual property rights. The study reinforces that while LLMs can enhance audit efficiency, they should complement rather than replace auditors. Their successful integration in external audits requires prompt engineering, regulatory guidance, and auditor oversight. These findings contribute to the growing research on LLMs in auditing and provide insights for audit firms considering their adoption.
{"title":"Exploring Large Language Models in external audits: Implications and ethical considerations","authors":"Lazarus Elad Fotoh , Tatenda Mugwira","doi":"10.1016/j.accinf.2025.100748","DOIUrl":"10.1016/j.accinf.2025.100748","url":null,"abstract":"<div><div>This study explores the impact of Large Language Models (LLMs) on external audits and their associated ethical implications. A small-scale survey was conducted with auditors from non-Big Four firms to assess their general perceptions of LLMs, followed by a qualitative evaluation of external LLMs in audit-specific tasks. In the latter, ChatGPT’s responses to audit-related scenarios were assessed by experienced audit partners, who rated and commented on the outputs without knowing their source. The findings indicate that while LLMs efficiently perform routine and mundane tasks such as generating human-like responses and preparing basic audit working papers and reports, external LLMs struggle to produce comprehensive, audit-specific reports. Non-Big Four auditors recognise LLMs’ time-saving potential and relevance in audit planning; however, concerns persist regarding the comprehensiveness and contextual relevance of external LLM-generated risk assessments and interpretations of auditing standards. Moreover, limitations inherent in external LLMs, such as outdated information and hallucinations, necessitate auditor oversight. Ethical concerns identified include threats to auditor objectivity, confidentiality, privacy, accountability, and intellectual property rights. The study reinforces that while LLMs can enhance audit efficiency, they should complement rather than replace auditors. Their successful integration in external audits requires prompt engineering, regulatory guidance, and auditor oversight. These findings contribute to the growing research on LLMs in auditing and provide insights for audit firms considering their adoption.</div></div>","PeriodicalId":47170,"journal":{"name":"International Journal of Accounting Information Systems","volume":"56 ","pages":"Article 100748"},"PeriodicalIF":4.1,"publicationDate":"2025-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144222963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-05-08DOI: 10.1016/j.accinf.2025.100747
Qiaoling Fang , Zichen Wang , Li Dang
This study investigates the impact of business strategy, digitalization, and their interaction on audit effort in the digital transformation era. Our findings reveal that Chinese prospector-type companies require higher levels of audit effort compared to defender-type companies. Furthermore, companies with greater digitalization tend to demand more audit effort due to the increased business risks associated with the adoption of advanced digital technologies. Contingency Theory predicts that a fit between prospector strategies and digitalization leads to more successful transformation outcomes and reduced business risks. Consistent with this theory, we find that the impact of digitalization on audit effort is reduced (increased) for prospector-type (defender-type) companies due to the strategic fit (misfit). This result highlights how the fit/misfit between a company’s strategy and its transformative initiatives can lead to varying levels of business risk, ultimately impacting the audit effort.
{"title":"Audit effort in the digital Era: Uncovering the dynamic interplay of business strategy and digital transformation","authors":"Qiaoling Fang , Zichen Wang , Li Dang","doi":"10.1016/j.accinf.2025.100747","DOIUrl":"10.1016/j.accinf.2025.100747","url":null,"abstract":"<div><div>This study investigates the impact of business strategy, digitalization, and their interaction on audit effort in the digital transformation era. Our findings reveal that Chinese prospector-type companies require higher levels of audit effort compared to defender-type companies. Furthermore, companies with greater digitalization tend to demand more audit effort due to the increased business risks associated with the adoption of advanced digital technologies. Contingency Theory predicts that a fit between prospector strategies and digitalization leads to more successful transformation outcomes and reduced business risks. Consistent with this theory, we find that the impact of digitalization on audit effort is reduced (increased) for prospector-type (defender-type) companies due to the strategic fit (misfit). This result highlights how the fit/misfit between a company’s strategy and its transformative initiatives can lead to varying levels of business risk, ultimately impacting the audit effort.</div></div>","PeriodicalId":47170,"journal":{"name":"International Journal of Accounting Information Systems","volume":"56 ","pages":"Article 100747"},"PeriodicalIF":4.1,"publicationDate":"2025-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143917354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-05-05DOI: 10.1016/j.accinf.2025.100745
Manuel Cano-Rodríguez , Manuel Núñez-Nickel , Ana Licerán-Gutiérrez
The Financial Statement Divergence (FSD) score, a metric of the deviation of figures from Benford’s Distribution, has become increasingly popular in assessing financial information quality at the firm-year level. We test the validity of this metric by analyzing (1) if error-free financial statements conform to Benford and (2) if the FSD score increases with the presence of accounting errors or manipulations. Regarding the first analysis, firm-year financial statements’ conformity to Benford is much lower than previously reported in the literature; this implies that the assumption of error-free financial statements conforming to Benford would hold only if an exceptionally high proportion of companies report financial statements with a substantial number of line items affected by errors or manipulations. Regarding the second analysis, we theoretically show that the relationship between accounting errors or manipulations and divergence from Benford is inconsistent: FSD score variations are independent of the size of the error or manipulation, and errors or manipulations may increase, decrease, or have no effect on the FSD score. Empirically, we show that various subsamples with a priori lower accounting quality do not exhibit a higher FSD score and, using simulated values, we verify that manipulations can increase, decrease, or have no effect on the FSD depending on the value of the pre-managed FSD. Taken together, our results cast doubts on the FSD score’s validity in assessing financial information quality at the firm-year level.
{"title":"Divergence from Benford’s law fails to measure financial statement accuracy","authors":"Manuel Cano-Rodríguez , Manuel Núñez-Nickel , Ana Licerán-Gutiérrez","doi":"10.1016/j.accinf.2025.100745","DOIUrl":"10.1016/j.accinf.2025.100745","url":null,"abstract":"<div><div>The Financial Statement Divergence (<em>FSD</em>) score, a metric of the deviation of figures from Benford’s Distribution, has become increasingly popular in assessing financial information quality at the firm-year level. We test the validity of this metric by analyzing (1) if error-free financial statements conform to Benford and (2) if the <em>FSD</em> score increases with the presence of accounting errors or manipulations. Regarding the first analysis, firm-year financial statements’ conformity to Benford is much lower than previously reported in the literature; this implies that the assumption of error-free financial statements conforming to Benford would hold only if an exceptionally high proportion of companies report financial statements with a substantial number of line items affected by errors or manipulations. Regarding the second analysis, we theoretically show that the relationship between accounting errors or manipulations and divergence from Benford is inconsistent: <em>FSD</em> score variations are independent of the size of the error or manipulation, and errors or manipulations may increase, decrease, or have no effect on the <em>FSD</em> score. Empirically, we show that various subsamples with <em>a priori</em> lower accounting quality do not exhibit a higher <em>FSD</em> score and, using simulated values, we verify that manipulations can increase, decrease, or have no effect on the <em>FSD</em> depending on the value of the pre-managed <em>FSD</em>. Taken together, our results cast doubts on the <em>FSD</em> score’s validity in assessing financial information quality at the firm-year level.</div></div>","PeriodicalId":47170,"journal":{"name":"International Journal of Accounting Information Systems","volume":"56 ","pages":"Article 100745"},"PeriodicalIF":4.1,"publicationDate":"2025-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143903401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-04-22DOI: 10.1016/j.accinf.2025.100746
Liang Sun
While cybersecurity is an important concern and CEOs play a crucial role in managing cybersecurity risks, evidence on how CEO characteristics influence data breach incidents is limited. Motivated by the increasing frequency and severity of data breaches, this study investigates how CEO gender affects firms’ likelihood of experiencing a data breach. The findings show that firms led by female CEOs are less likely to experience breaches. This association remains robust after matching on breach likelihood and correcting for selection bias. Cross-sectional analyses show that the effect of female CEOs on reducing data breach likelihood is more pronounced in poorly governed firms and in firms lacking IT expertise among top executives. Further investigation suggest that enhanced IT governance is a mechanism through which female CEOs reduce firm’s data breach likelihood. Overall, my findings reveal how CEO characteristics influence firms’ cybersecurity outcomes and complement the literature on information security and gender diversity in corporate leadership.
{"title":"CEO gender and cybersecurity: The role of female CEOs in mitigating data breach risks","authors":"Liang Sun","doi":"10.1016/j.accinf.2025.100746","DOIUrl":"10.1016/j.accinf.2025.100746","url":null,"abstract":"<div><div>While cybersecurity is an important concern and CEOs play a crucial role in managing cybersecurity risks, evidence on how CEO characteristics influence data breach incidents is limited. Motivated by the increasing frequency and severity of data breaches, this study investigates how CEO gender affects firms’ likelihood of experiencing a data breach. The findings show that firms led by female CEOs are less likely to experience breaches. This association remains robust after matching on breach likelihood and correcting for selection bias. Cross-sectional analyses show that the effect of female CEOs on reducing data breach likelihood is more pronounced in poorly governed firms and in firms lacking IT expertise among top executives. Further investigation suggest that enhanced IT governance is a mechanism through which female CEOs reduce firm’s data breach likelihood. Overall, my findings reveal how CEO characteristics influence firms’ cybersecurity outcomes and complement the literature on information security and gender diversity in corporate leadership.</div></div>","PeriodicalId":47170,"journal":{"name":"International Journal of Accounting Information Systems","volume":"56 ","pages":"Article 100746"},"PeriodicalIF":4.1,"publicationDate":"2025-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143859213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-03-19DOI: 10.1016/j.accinf.2025.100742
Joung W. Kim , Daeun Lee
We conduct an in-depth examination of excessive custom XBRL tag usage in 10-K filings among U.S. firms. We discuss why some firms are prone to creating custom tags in 10-K filings and assess whether such excessive usage is associated with heightened regulatory attention from the SEC. First, we find that firms with weak internal controls are more likely to create custom tags in 10-K filings. Next, we observe a positive association between excessive custom tag usage and SEC oversight, evidenced by a higher likelihood of receiving comment letters and increased SEC involvement, which raises concerns over substantive disclosure deficiencies. In response to increased regulatory scrutiny, we document that firms reduce the proportion of custom tags in subsequent filings, and we find that SEC-reviewed custom tags enhance the informativeness of financial reports for investors. Collectively, our findings suggest that the excessive use of custom tags reflects a manifestation of firms’ disclosure deficiencies, which are mitigated during the SEC review process.
{"title":"Excessive custom XBRL tag usage in 10-K filings and SEC oversight","authors":"Joung W. Kim , Daeun Lee","doi":"10.1016/j.accinf.2025.100742","DOIUrl":"10.1016/j.accinf.2025.100742","url":null,"abstract":"<div><div>We conduct an in-depth examination of excessive custom XBRL tag usage in 10-K filings among U.S. firms. We discuss why some firms are prone to creating custom tags in 10-K filings and assess whether such excessive usage is associated with heightened regulatory attention from the SEC. First, we find that firms with weak internal controls are more likely to create custom tags in 10-K filings. Next, we observe a positive association between excessive custom tag usage and SEC oversight, evidenced by a higher likelihood of receiving comment letters and increased SEC involvement, which raises concerns over substantive disclosure deficiencies. In response to increased regulatory scrutiny, we document that firms reduce the proportion of custom tags in subsequent filings, and we find that SEC-reviewed custom tags enhance the informativeness of financial reports for investors. Collectively, our findings suggest that the excessive use of custom tags reflects a manifestation of firms’ disclosure deficiencies, which are mitigated during the SEC review process.</div></div>","PeriodicalId":47170,"journal":{"name":"International Journal of Accounting Information Systems","volume":"56 ","pages":"Article 100742"},"PeriodicalIF":4.1,"publicationDate":"2025-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143678306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-03-13DOI: 10.1016/j.accinf.2025.100744
Yu-Cheng Lin , Roni Padliansyah , Yu-Hsin Lu , Wen-Rang Liu
Accurately predicting a company’s future performance is vital for both management and investors. This study employs the Explainable Artificial Intelligence (XAI) approach, utilizing a Convolutional Neural Network model (CNN) to forecast company financial conditions based on their financial ratios. By transforming financial data into images, we introduce a Bankruptcy Prediction Model (BPM) that enhances interpretability through techniques like Shapley Additive exPlanations (SHAP) and Local Interpretable Model-Agnostic Explanations (LIME). These XAI methods aim to clarify AI decisions in the BPM, addressing the ongoing debate within the financial research community regarding the most informative ratios for bankruptcy prediction. This research marks a significant advancement in financial accounting by merging the transparency of XAI with effective bankruptcy prediction, offering a more comprehensive understanding of financial ratio analysis.
{"title":"Bankruptcy prediction: Integration of convolutional neural networks and explainable artificial intelligence techniques","authors":"Yu-Cheng Lin , Roni Padliansyah , Yu-Hsin Lu , Wen-Rang Liu","doi":"10.1016/j.accinf.2025.100744","DOIUrl":"10.1016/j.accinf.2025.100744","url":null,"abstract":"<div><div>Accurately predicting a company’s future performance is vital for both management and investors. This study employs the Explainable Artificial Intelligence (XAI) approach, utilizing a Convolutional Neural Network model (CNN) to forecast company financial conditions based on their financial ratios. By transforming financial data into images, we introduce a Bankruptcy Prediction Model (BPM) that enhances interpretability through techniques like Shapley Additive exPlanations (SHAP) and Local Interpretable Model-Agnostic Explanations (LIME). These XAI methods aim to clarify AI decisions in the BPM, addressing the ongoing debate within the financial research community regarding the most informative ratios for bankruptcy prediction. This research marks a significant advancement in financial accounting by merging the transparency of XAI with effective bankruptcy prediction, offering a more comprehensive understanding of financial ratio analysis.</div></div>","PeriodicalId":47170,"journal":{"name":"International Journal of Accounting Information Systems","volume":"56 ","pages":"Article 100744"},"PeriodicalIF":4.1,"publicationDate":"2025-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143609497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-03-10DOI: 10.1016/j.accinf.2025.100743
David Veganzones , Eric Séverin
To create new insights and understanding of earnings management, this study attempts to diagnose firms’ financial profiles using machine learning methods and thereby provide a visual representation of the financial profiles that characterize earnings management strategies (upward and downward) and tools (accruals and real activities). By applying a novel machine learning method to detect signs of earnings management, this research reveals diverse financial profiles related to earnings management. Firms that conduct downward manipulation (accruals and real activities) share a sound financial profile. For firms that manipulate earnings upward, different types of financial distress influence the earnings management tool they use: Companies with liquidity constraints undertake accruals earnings management; companies with solvency difficulties are prone to real activities management. Notably, the proposed machine learning method outperforms traditional prediction methods in detecting signals of earnings management.
{"title":"Earnings management visualization and prediction using machine learning methods","authors":"David Veganzones , Eric Séverin","doi":"10.1016/j.accinf.2025.100743","DOIUrl":"10.1016/j.accinf.2025.100743","url":null,"abstract":"<div><div>To create new insights and understanding of earnings management, this study attempts to diagnose firms’ financial profiles using machine learning methods and thereby provide a visual representation of the financial profiles that characterize earnings management strategies (upward and downward) and tools (accruals and real activities). By applying a novel machine learning method to detect signs of earnings management, this research reveals diverse financial profiles related to earnings management. Firms that conduct downward manipulation (accruals and real activities) share a sound financial profile. For firms that manipulate earnings upward, different types of financial distress influence the earnings management tool they use: Companies with liquidity constraints undertake accruals earnings management; companies with solvency difficulties are prone to real activities management. Notably, the proposed machine learning method outperforms traditional prediction methods in detecting signals of earnings management.</div></div>","PeriodicalId":47170,"journal":{"name":"International Journal of Accounting Information Systems","volume":"56 ","pages":"Article 100743"},"PeriodicalIF":4.1,"publicationDate":"2025-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143579594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-03-10DOI: 10.1016/j.accinf.2025.100727
Tassilo L. Föhr , Valentin Reichelt , Kai-Uwe Marten , Marc Eulerich
Process Mining (PM) enhances the evaluation of the internal control system with corresponding tests of controls due to a comprehensive analysis of variants within business processes. It can be used by external and internal auditors to improve audit efficiency, effectiveness, and quality. Nevertheless, PM is still not an industry-wide best-practice standard, especially due to existing implementation barriers for practitioners. This study utilizes Design Science Research (DSR) to develop the Audit Process Mining (APM) Framework to implement PM into audit tasks and overcome existing implementation barriers. The APM Framework was designed using empirical insights extracted from interviews with subject matter experts across various audit firms and large industrial companies. Furthermore, 19 auditing professionals confirmed that the APM Framework is a valid and verified solution.
{"title":"A Framework for the Structured Implementation of Process Mining for Audit Tasks","authors":"Tassilo L. Föhr , Valentin Reichelt , Kai-Uwe Marten , Marc Eulerich","doi":"10.1016/j.accinf.2025.100727","DOIUrl":"10.1016/j.accinf.2025.100727","url":null,"abstract":"<div><div>Process Mining (PM) enhances the evaluation of the internal control system with corresponding tests of controls due to a comprehensive analysis of variants within business processes. It can be used by external and internal auditors to improve audit efficiency, effectiveness, and quality. Nevertheless, PM is still not an industry-wide best-practice standard, especially due to existing implementation barriers for practitioners. This study utilizes Design Science Research (DSR) to develop the Audit Process Mining (APM) Framework to implement PM into audit tasks and overcome existing implementation barriers. The APM Framework was designed using empirical insights extracted from interviews with subject matter experts across various audit firms and large industrial companies. Furthermore, 19 auditing professionals confirmed that the APM Framework is a valid and verified solution.</div></div>","PeriodicalId":47170,"journal":{"name":"International Journal of Accounting Information Systems","volume":"56 ","pages":"Article 100727"},"PeriodicalIF":4.1,"publicationDate":"2025-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143579593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}