Affiliation:
1. Rutgers, The State University of New Jersey
Abstract
ABSTRACT
The emergence of enormous disparate data sources, available in a multitude of alternate formats, and on very different devices, is leading to a business process revolution. This paper argues for a new approach in which these technologies are used to replace outdated blanket government intervention programs. Highly targeted interventions for social programs identified and addressed by Big Data-based methodologies would replace outdated government programs. This approach advocates for original detective methodologies, direct government action, and outcome monitoring all of which utilize Big Data-based frequent examination. The government would be in a privileged situation where it could obtain data not available to most other parties due to privacy laws. The data structures of the government would be protected by encryption and blockchain privacy-protection methodologies that would only reveal targeted outcomes to the direct-action agent. These same methodologies are applicable for business measurement (accounting) and assurance (audit).
Publisher
American Accounting Association
Subject
Computer Science Applications,Accounting
Reference61 articles.
1. Privacy-preserving data mining;Agrawal;ACM Sigmond Record,2000
2. Aggarwal, C. C., and P. S.Yu,
eds. 2008. Privacy-Preserving Data Mining: Models and Algorithms. New York, NY: Springer.
3. Feasibility and economics of continuous assurance;Alles;Auditing: A Journal of Practice & Theory,2002
4. American Institute of Certified Public Accountants (AICPA). 2013. Audit Data Standards. Available at: https://www.aicpa.org/content/dam/aicpa/interestareas/frc/assuranceadvisoryservices/downloadabledocuments/auditdatastandards-gl-august2013.pdf
5. American Institute of Certified Public Accountants (AICPA). 2015. Continuous Auditing and Audit Analytics. Monograph. New York, NY: AICPA.
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献