Reference Hub4
Using Belief Functions in Software Agents to Test the Strength of Application Controls: A Conceptual Framework

Using Belief Functions in Software Agents to Test the Strength of Application Controls: A Conceptual Framework

Robert A. Nehmer, Rajendra P. Srivastava
Copyright: © 2016 |Volume: 12 |Issue: 3 |Pages: 19
ISSN: 1548-3657|EISSN: 1548-3665|EISBN13: 9781466689428|DOI: 10.4018/IJIIT.2016070101
Cite Article Cite Article

MLA

Nehmer, Robert A., and Rajendra P. Srivastava. "Using Belief Functions in Software Agents to Test the Strength of Application Controls: A Conceptual Framework." IJIIT vol.12, no.3 2016: pp.1-19. http://doi.org/10.4018/IJIIT.2016070101

APA

Nehmer, R. A. & Srivastava, R. P. (2016). Using Belief Functions in Software Agents to Test the Strength of Application Controls: A Conceptual Framework. International Journal of Intelligent Information Technologies (IJIIT), 12(3), 1-19. http://doi.org/10.4018/IJIIT.2016070101

Chicago

Nehmer, Robert A., and Rajendra P. Srivastava. "Using Belief Functions in Software Agents to Test the Strength of Application Controls: A Conceptual Framework," International Journal of Intelligent Information Technologies (IJIIT) 12, no.3: 1-19. http://doi.org/10.4018/IJIIT.2016070101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Belief functions have been used to model audit decision making for over 20 years. More recently they have been used in assessing the strength of internal controls and information systems security. There has been some research on software agents in auditing, particularly in the web search bot area Nelson et al. (2000). This research used their results to develop an agent model to provide CPA services which add value to client automated systems. It extends the work of Srivastava and others (Bovee et al., 2007; Srivastava & Shafer, 1992; Srivastava, 1997) in belief functions and Nehmer (2003, 2009) in the use of software agents in internal control evaluations. It looks at the problem of monitoring and assuring the adequacy of application internal controls in highly automated transaction processing environments.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.