Affiliation:
1. Rutgers, The State University of New Jersey
2. Tsinghua University
Abstract
ABSTRACT
This paper explores the possibility of sharing contemporaneous firm-level information within an audit firm in a privacy-preserving manner. We develop a number of sharing schemes for utilizing contemporaneous accounting information from peer companies without violating clients' confidentiality and observe significant improvements in both estimation accuracy and error detection performance. To satisfy different levels of privacy protection, we propose different sharing schemes by utilizing auditors' self-generated expectations, and the results show that the benefits to auditors from only sharing self-generated estimation residuals (errors) are comparable to that from sharing predicted or actual accounting numbers. To satisfy stricter privacy concerns, we also propose a series of schemes based on sharing categorical information derived from prediction errors. Finally, we use Borda counts to analyze how the choice of the best model changes depending on the cost of errors within different experimental settings.
Publisher
American Accounting Association
Subject
Management of Technology and Innovation,Information Systems and Management,Human-Computer Interaction,Accounting,Information Systems,Software,Management Information Systems
Reference52 articles.
1. Albuquerque,
A.,
De Franco
G.,
and
VerdiR.
2013.
Peer choice in CEO compensation.
Journal of Financial Economics108 (
1):
160–
181.
https://doi.org/10.1016/j.jfineco.2012.10.002
2. American Institute of Certified Public Accountants (AICPA).
2014.
AICPA Code of Professional Conduct.
Available at: https://www.aicpa.org/content/dam/aicpa/research/standards/codeofconduct/downloadabledocuments/2014december15contentasof2016august31codeofconduct.pdf
3. Bae,
G. S.,
Choi
S. U.,
Dhaliwal
D. S.,
and
LamoreauxP. T.
2017.
Auditors and client investment efficiency.
The Accounting Review92 (
2):
19–
40.
https://doi.org/10.2308/accr-51530
4. Bellare,
M.,
Boldyreva
A.,
Desai
A.,
and
PointchevalD.
2001.
Key-privacy in public-key encryption.
Available at: https://iacr.org/archive/asiacrypt2001/22480568.pdf
5. Blankley,
A. I.,
Hurtt
D. N.,
and
MacGregorJ. E.
2012.
Abnormal audit fees and restatements.
Auditing: A Journal of Practice & Theory31 (
1):
79–
96.
https://doi.org/10.2308/ajpt-10210
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献