首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到10条相似文献,搜索用时 78 毫秒
1.
Use of test data is an important evidence collection method that auditors can employ to evaluate the authenticity, accuracy, and completeness of program processing. Nevertheless, test data design is a time-consuming and error-prone process. To facilitate design, two approaches advocated are the decision-tree approach and the decision-table approach. An experiment conducted to examine the quality of test data designs produced using both approaches showed some support for the superiority of the decision-table approach over the decision-tree approach. Insofar as the results obtained are problematical, however, the research needs to be replicated and extended.  相似文献   

2.
In this paper, we design a valuation model for intangible assets using panel data, and empirically investigate the model validity. The approach using panel data is an evaluation method that uses unobserved firm-specific effects based on panel analysis. Our model first estimates production function using panel analysis, and then develops cost function using a duality approach. Next, we discount added value and costs resulting from intangible assets using fixed effects. Empirical analysis using the model compares the estimated parameter values in the nonlinear profit function consisting of production function and cost function with those in the production function alone, which becomes linear after logarithmic conversion, and finds that the two are generally similar. Additionally, the market value of equity is more closely associated with both the book value of equity and the value of intangible assets than with the book value of equity alone. These results support the validity of the model for evaluating intangible assets. This model is easy to apply in practice and is based on a simple idea. Further discussion of this model is warranted given the increasing importance attached to the value of intangible assets.  相似文献   

3.
In this paper, we assess the impact of the securities transaction tax (STT) introduced in France in 2012 on market liquidity and volatility. To identify causality, we rely on a distinctive design of the tax, which is imposed on large French firms only, all listed on Euronext. This provides two reliable control groups (smaller French firms and foreign firms listed on Euronext) and allows us to use a difference-in-difference approach in order to isolate the impact of the tax from the other economic changes that have occurred simultaneously. We find that the STT has reduced stock trading, but we find no significant effect on theoretically based measures of liquidity, such as price impact, and no significant effect on volatility. The results are robust whether we rely on different control groups (German stocks listed on the Deutsche Börse), different datasets (firm-level or aggregated data), different periods (from one to six months), or different methodologies (propensity score matching, regression discontinuity design).  相似文献   

4.
In this article, the relation between non-performing loans (NPL) of the Brazilian banking system and macroeconomic factors, systemic risk, and banking concentration is empirically tested. In evaluating this relation, we use a dynamic specification with fixed effects, while using a panel data approach. The empirical results suggest that the banking concentration has a statistically significant impact on NPL, suggesting that more concentrated banking systems may improve financial stability. These results are important for the design of banking regulation policies.  相似文献   

5.
This paper presents a framework for proactive and intelligent continuous control monitoring (CCM) that helps management gain higher assurance over business processes and alleviate information overload. We adopt a design science approach towards systematically developing CCM artifacts, including operation and internal control violation display and multidimensional anomaly detection. We illustrate the design with an implementation project whereby a CPA firm, the firm's healthcare sector client, and the research team work together to improve the assurance provided by payroll reviews. This study contributes to the CCM literature by envisioning that interactive data visualization and machine learning technologies can alleviate information overload for management in CCM. Second, we provide real-world evidence on the improvement brought to economic and behavioral aspects of the control monitoring process compared to the traditional approach. We show that emerging technologies substantially improve the efficiency and effectiveness of risk assessment, anomaly detection, and loss prevention. We also contribute to control monitoring practice by providing guidance on artifact development and application for practitioners to follow.  相似文献   

6.
This paper investigates how environmental and social (E&S) risks and topics (i. e. E&S issues that are important in terms of adaptation to a changing business environment) are integrated in the banking sector. Despite banks’ key role in steering financial flows towards sustainable development, little is currently known as to whether and how banks integrate E&S aspects into their management control systems and whether this integration translates into E&S performance. Building on prior studies in the environmental management control literature, we design a conceptual model in which we link contextual factors, a proactive strategy approach, E&S management controls, and E&S performance. Following common practice in the banking sector, we differentiate between two paths of E&S management controls: risk management (value protection) and topic management (value creation). Based on survey data for a small sample of 50 European banks, we find evidence that contextual factors, reflected in the perceived power and legitimacy of clients, voluntary standard setters and NGOs, are positively related to a proactive strategy approach. This proactive strategy translates into both topic and risk management. Yet, in the next step, only topic management is positively related to the E&S performance of a bank, but not risk management.  相似文献   

7.
We claim that previously proposed parametric specifications that linearly approximate the term structure of the implied volatility surface (IVS) in option prices fail to capture important information regarding the expectations of market participants. This paper proposes a parametric specification for describing the IVS that allows flexible modeling of the term structure through a Nelson and Siegel (1987) factorization, recently proposed by Diebold and Li (2006) in the context of yield curve modeling. The specification is tested on implied volatilities from the over-the-counter foreign exchange options market, where contracts with long expiries are actively traded and thus the term structure dimension of the surface should be very important. We first show that the proposed volatility specification can consistently and remarkably improve our ability to describe the surface on any given day. We then establish the economic relevance of the incremental information captured by our proposed specification by showing that it can produce more accurate forecasts of implied volatility that can support long-term profitable trading strategies in the absence of transaction costs.  相似文献   

8.
This study investigates whether audit risks that accompany data breaches of major customer firms can spillover into the supply chain and affect audit fees of their suppliers. Based on the economic bond that exists between supplier firms and their major customers, we predict that data breach incidents of customer firms will lead to higher audit fees for their respective suppliers. Consistent with customer breaches increasing the audit risk to the supplier, we observe a positive association between breach disclosures made by major customers and audit fees of the supplier firm. This association exists for both internal and external data breaches. We further find that audit fees are increasing with the number of major customers disclosing a breach in a given year. Our results are robust to both a matched sample design and a difference-in-difference approach. Interestingly, we find that while supplier auditors appear to price the risks associated with customer breaches, the breaches do not appear to affect audit quality. The findings of this study are timely and relevant to academics, practitioners, and regulators as supply chains continue to become larger and more complex.  相似文献   

9.
We apply a bivariate approach to the asset allocation problem for investors seeking to minimize the probability of large losses. It involves modelling the tails of joint distributions using techniques motivated by extreme value theory. We compare results with a corresponding univariate approach using simulated and financial data. Through an examination of a simulated and real financial data set we show that the estimated risks using the bivariate and univariate approaches are in close agreement for a wide range of losses and allocations. This is important since the bivariate approach is significantly more computationally expensive. We therefore suggest that the univariate approach be used for the typical level of loss that an investor may want to guard against. This univariate approach is effective even if there are more than two assets. The software written in support of this work is available on demand and we describe its use in the appendix.  相似文献   

10.
Risk of unauthorized disclosure or modification of corporate data can impact in different ways, including affecting operations, the public image and/or the firm's legal/compliance exposure. While management views risk along these dimensions, the information technology function (ITF) typically views risk from an IT infrastructure compromise viewpoint, and this drives the establishment of IT security controls. It is oftentimes difficult for the internal audit function (IAF) to assess control deficiency risk (CDR) in the area of information security, as well as estimate the importance of each in-place security control. Using a design science approach, we propose the Operational, Public image, Legal (OPL) model and method to classify the security criticality of the organization's data along three dimensions. Through an empirical study, we demonstrate how the OPL method allows for a quantitative estimation of the importance of in-place security controls as well as the CDR of missing controls. This information provides guidance on strategies for testing in-place controls during audit, as well as for determining which controls may need to be incrementally added.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号