Abstract
This article discusses methods to support assurance of surveillance monitoring and compliance verification knowledge management (CV-KM). The discussion includes aspects of primary monitoring systems, the different environments in which they operate, the verification problem solving and decision making tasks, the problem structure, and the coordination of the review process to facilitate truth maintenance and regulatory Meta rules. Based on the ALCOD (Alert Coding) prototype developed with the Surveillance Division of the Australian Stock Exchange (ASX), the surveillance operation is considered a primary monitoring function with the analysis of the resulting output the second-tier monitoring function—the assurance component.
Similar content being viewed by others
References
Abdi, H. (2007). Signal detection theory. In N. J. Salkind (Ed.), Encyclopedia of measurement and statistics (pp. 886–889) Thousand Oaks (CA): Sage.
Abdul-gader, A., & Koza, K. (1990). Discourse analysis for knowledge acquisition: The coherence method. Journal of Management Information Systems, 6(4), 61–81.
ASX (2006). Retrieved from http://www.asx.com.au/supervision/enforcing_rules/enforcement_unit.htm.
Australian Financial Review (2006). ASIC plans $30m project to target insider trading. Monday, 11, December 11, 2006, 1,14.
Berry, J., & Yanco, G. (1990). Enter the ASX computer police. Journal of the Securities Institute of Australia, 1, 2–5, March.
Blocher, E., & Cooper, J. (1988). A study of auditors’ analytical review performance. Auditing: A Journal of Practice and Theory, 1–28, (Spring).
Bond, A. H., & Gasser, L. (Eds.) (1988). Readings in Distributed Artificial Intelligence. San Mateo: Morgan Kaufman.
Boose, J. H. (1985). A knowledge acquisition program or expert systems based on personal psychology construct. International Journal of Man-Machine Studies, 23(5), 495–525.
Buchanan, J. H. (1982). Expertise transfer for expert system design. New York: Elsevier.
Busby, J., & Strutt, J. (2001). What limits the ability of design organizations to predict failure? Proceedings of the Institution of Mechanical Engineers (215) Part B: 1471–1474.
Butler, K. A., & Corter, J. E. (1986). Use of psychometric tools for knowledge acquisition. In W. A. Gale (ed.), Artificial Intelligence in Statistics. Reading, Addison-Wesley, MA, 295–319.
Byrnes, E. C., Thomas, N. H., & Waldman, S. (1990). Inspector: An expert system for monitoring world-wide trading activities in foreign exchange. AI Review, (3), 9–13.
Chang, A., Bailey, A. Jr., & Whinston, A. (1993). Multi-auditor cooperation: A model of distributed reasoning. IEEE Transactions On Engineering Management, 20(4), 346–359.
Clarke, R. (1988). Information technology and dataveillance. Communications of the ACM, 31(5), 498–512.
Cohen, J. (1968). Weighted kappa: Nominal scale agreement with provision for scaled disagreement or partial credit. Psychological Bulletin, 70(4), 213–220.
Cravetto, C., Lesmo, L., Molino, G., & Torasso, P. (1985). LITO2: A frame based expert system for medical diagnosis in hepatology. In I. De Lotto, M. Stefanelli (eds.), Artificial intelligence in medicine (pp. 107–119) Amsterdam: North-Holland.
Davis, S., & Ord, K. (1990). Improving and measuring the performance of a security industry surveillance system. Interfaces, 20(5), 31–42.
Debowski, S. (2006). Knowledge management. Sydney: Wiley and Sons.
de Kleer, J. (1986). An assumption based truth maintenance system. Artificial Intelligence, 28(2), 127–162.
Diederich, J., Ruhmann, I., & May, M. (1987). Kriton: A knowledge acquisition tool for expert systems. International Journal of Man-Machine Studies, 26(1), 29–40.
Denning, D. (2006). Dorothy Denning’s home page. Retrieved from http://www.cs.georgetown.edu/~denning/index.html.
FBI. (1999). Digital storm. FBI Annual Report. Retrieved www.fbi.gov/programs/lab/labannual99.pdf.
Fleiss, J. L. (1981). Statistical methods for rates and proportions. Wiley: NY.
Freedman, R. (1991). AI on wall street. IEEE Expert, 6(2), 2–7.
Freedman, R. S., & Mathai, J. (1995). Market analysis for risk management and regulation: An artificial intelligence approach. In R. Freedman, R. Klein, & J. Lederman (eds.), Artificial intelligence in the capital market. (pp. 315–326) Chicago, Illinois: Probus.
Freedman, R. S., & Stuzin, G. J. (1991). Knowledge-based methodology for tuning analytical models. IEEE Transactions on Systems, Man, and Cybernetics, 21(2), 347–358.
Goldschmidt, P. (1996). Compliance monitoring for anomaly detection in a complex environment using multiple agents: Supporting capital market surveillance. Ph.D. dissertation, The University of Western Australia, July 1996. This was awarded The 1997 International Outstanding Doctoral Dissertation Award: Information Systems section of the American Accounting Association eligible for Ph.D. dissertations completed between the years 1994–1996 inclusive.
Goldschmidt, P. (2000). CMAD and integrated safeguards. Invited presentation to The Australian Department of Foreign Affairs and Trade, Australian Safeguards and Non-proliferation Office, Canberra, Australia.
Goldschmidt, P. (2001). Assurance and compliance monitoring support. In G. Dhillon (Ed.), Information security management: Global challenges in the next millennium 10, (pp. 135–154). Hershey, PA: Idea Group.
Goldschmidt, P. (2005). Supporting assurance and compliance monitoring. In M. Khosrow-Pour (ed.), Encyclopedia of information science and technology, 5, 2684–2689, Hershey, PA: Information Resources Management Association, Idea Group.
Goldschmidt, P. (2006). Compliance monitoring for anomaly detection. http://www.patentstorm.us/patents/6983266-description.html. US Patent Issued on January 2006.
Green, D. M., & Swet, J. A. (1966). Signal detection theory and psychophysics. New York: Wiley.
Hayes-Roth, F., Waterman, D. A., & Lenat, D. B. (1983). Building expert systems. Reading, MA: Addison-Wesley.
Holsapple, C. W., & Whinston, A. B. (1987). Knowledge-based organisations. The Information Society, 5(2), 77–90.
Howorka, G. V., Anderson, L. A., Goul, K. M., & Hine, M. (1995). A computational model of coordination for the design of organisational decision support systems. Intelligent Systems in Accounting, Finance and Management, 4(1), 43–70.
Jacob, V., & Pirkul, H. (1992). A framework for supporting distributed group decision-making. Decision Support Systems, 8(1), 17–28.
Jennex, M. E., & Olfman, L. (2006). A model of knowledge management success. International Journal of Knowledge Management, 3(2), 51–68.
Jennex, M. E., Smolnik, S., & Croasdell, D. (2007). Towards defining knowledge management success, 40th Hawaii Conference on System Sciences, HICSS, IEEE Computer Society.
Jin, Y., & Levitt, R. E. (1993). i-Agents: Modeling organisational problem solving in multi-agent teams. Intelligent Systems in Accounting, Finance and Management, 2(4), 247–270.
Koonce, L. (1993). A cognitive characterisation of audit analytical review. Auditing: A Journal of Practice and Theory, 12(Supplementary), 57–76.
Landon, D., Munson, M., Nadeau, S., Landsman, S., Schroeder, B., Cheung, E. t al. (2006). Integrated stream processing and persistent data retrieval. Sensor Data Analysis Framework Research Roadmap, Mitre Corp, Virginia.
Libby, R. (1985). Availability and the generation of hypotheses in analytical review. Journal of Accounting Research, 23(2), 648–667.
Libby, R., & Trotman, K. (1993). The review process as a control for differential recall of evidence in auditor judgments. Accounting, Organisations and Society, 18(6), 559–574.
Liou, Y. (1990). Knowledge acquisition: Issues, techniques and methodologies. Data Base, 23(1), 59–64.
Major, J., & Riedinger, D. (1992). EFD: A hybrid knowledge / statistical-based system for the detection of fraud. International Journal of Intelligent Systems, 7, 687–703.
Morrison, J. (1993). Team memory: Information support for business teams. Proceedings of the 26th Annual Hawaii International Conference on Systems Sciences, Wailea, Hawaii, 3, 122–131.
O’Keefe, R. M., & O’Leary, D. (1993). Expert systems verification and validation: A survey and tutorial. Artificial Intelligence Review, 7(1), 3–42.
O’Leary, D. (1991). Artificial intelligence and expert systems in accounting databases: Survey and extensions. Expert Systems with Applications, 3, 143–152.
Olsen, J., & Reuter, H. (1987). Extracting expertise from experts: Methods for knowledge acquisition. Expert Systems, 4(3), 152–168.
Pete, A., Kleinman, D., & Pattipati, K. (1993). Tasks and organisational signal detection model of organisational decision making. Intelligent Systems in Accounting, Finance and Management, 2(4), 289–303.
Pieters, R., & Zeelenberg, M. (2005). On bad decisions and deciding badly: When intention-behavior inconsistency is regrettable. Journal of Organizational Behavior and Human Decision Processes, 97(1), 18–30.
Roohani, S. (2003). Trust and data assurances in capital markets: The role of technology solutions. Price Waterhouse Coopers research monograph, S J. Roohani, Ed. RI: Bryant College.
Senator, T., Goldberg, H., Wooten, J., Cottini, M., Khan, A., Klinger, C. et al. (1995). Financial crimes enforcement network AI system (FAIS). AI Magazine, 16(4), 21–39.
Shaw, M. J., & Fox, M. S. (1993). Distributed artificial intelligence for group decision support. Decision Support Systems, 9(4), 349–367.
Simon, H. (1973). The structure of ill structured problems. Artificial Intelligence, 4(3–4), 181–201.
Simon, H. (1977). The new science of management decisions, revised edition. Engelwood Cliffs, NJ: Prentice Hall.
Sol, H. (1982). Simulation in Information Systems Development. Ph.D. dissertation, University of Groningen, The Netherlands.
SRI International. (1999). Experience with Emerald to Date. Retrieved from http://www.csl.sri.com/%7eneumann/det99.html.
Starbuck, W., & Milliken, F. (1988). Challenger: Fine-tuning the odds until something breaks. Journal of Management Studies, 25(4), 319–340.
Torasso, P., & Console, L. (1989). Diagnostic problem solving. London: North Oxford Academic.
Vasarhelyi, M. A., & Halper, F. B. (1991). The continuous audit of online systems. Auditing: A Journal of Theory and Practice, 10(1), 110–125.
Warkentin, M. (1993). Verbal domain knowledge acquisition: Unplugging the bottleneck. Heuristics: The Journal of Knowledge Engineering and Technology, 6(3), 21–26.
Weaver, E., & Richardson, G. (2006). Threshold setting and the cycling of a decision threshold. System Dynamics Review, 2(1), 1–26.
Winston, P. (1977). Artificial intelligence. Reading, MA: Addison-Wesley.
Zadeh, L. (1978). Fuzzy sets as a basis for a theory of possibility. Fuzzy Sets and Systems, 1, 3–28.
Zadeh, L. (1983). The role of fuzzy logic in the management of uncertainty in expert systems. Fuzzy Sets and Systems, 11, 199–227.
Author information
Authors and Affiliations
Corresponding author
Additional information
Alert-KM Pty Ltd. holds exclusive intellectual property rights to the CV-KM and CMAD business process methods. This IP is covered by full patents for Australian 758491, Singapore, 200106150-6, USA, 6,983,266, patent pending Hong Kong 02106820.1; Canada 2,366,548, EU Patent Cooperative Treaty International Application No. PCT AU00/00295 (19 countries).Aspects of this paper were presented at the 2nd Information Warfare and Security Conference, Perth 2001; the Information Systems Audit and Control Association Conference, Auckland, New Zealand, November 2004; the Encyclopaedia of Information Science and Technology (Five-Volume Set), Idea Group, Hershey, 2005; and the 3rd Australian Information Security Management Conference, at the Forensic Conference held at Edith Cowan University, September 2005, Perth Australia.“Compliance Monitoring for Anomaly Detection”—CMAD—coined by P. Goldschmidt in 1995 has no relationship or affiliation with “Computer Misuse and Anomaly Detection” previously coined by UC Davis.
Rights and permissions
About this article
Cite this article
Goldschmidt, P. Managing the false alarms: A framework for assurance and verification of surveillance monitoring. Inf Syst Front 9, 541–556 (2007). https://doi.org/10.1007/s10796-007-9048-1
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10796-007-9048-1