REFERENCES
- Albrecht, Conan C. (2003). Audit at a crossroads. Rollins Center for eBusiness, Marriott School of Management, Brigham Young University. http://www.galaxy.gmu.edu/interface/I03/I2003Proceedings/AlbrechtConan/AlbrechtConan.paper.pdf (Accessed: 21 February 2008 ).
- Albrecht , Conan C. , Albrecht , W. Steve and Gregory , J. 2000 . Conducting a pro-active fraud audit: A case study . Journal of Forensic Accounting , II : 203 – 218 .
- AU Section 316. Consideration of fraud in a financial statement audit. http://www.pcaobus.org/standards/interim_standards/auditing_standards/au_316.html (Accessed: 21 February 2008 ).
- Debreceny, Roger S., GrayGlen L., Ng, Joeson Jun-Jin, Siow-Ping Lee, Kevin, Yau, Woon-Foong. Embedded audit modules in enterprise resource planning systems: Implementation and functionality. http://www.atypon-link.com/AAA/doi/abs/10.2308/jis.2005.19.2.7 (Accessed: 21 February 2008 ).
- Debreceny, R., Gray, G. L., Tham, W.-L., Goh, K.-Y., Tang, P.-L. (July 2003). The development of embedded audit modules to support continuous monitoring in the electronic commerce environment. International Journal of Auditing, 7(2), 169–185. http://www.ingentaconnect.com/content/bpl/ijau/2003/00000007/00000002/art00006 (Accessed: 21 February 2008 ).
- Nigrini, M. J. (1996). Cheating behavior and the Benford's Law “A Taxpayer Compliance Application of Benford's Law.” Journal of the American Taxation Association, 18(1), 72–91. www.prres.net/Papers/Geyer_Cheating_Behavior_And_The_Benford's_Law.pdf (Accessed: 21 February 2008 ).
- Nigrini, Mark J. (1999). I've got your number. Journal of Accountancy, 187 http://www.questia.com/googleScholar.qst;jsessionid=H01pH9PWfYnvgGFr39kDdvBlZcFNnRcGCP1GQqPTM3VXTFSyN2kL!-426025227?docId=5001257377 (Accessed: 21 February 2008 ).
- Sirikulvadhanna, Supatcharee. Data mining as a financial auditing tool, M.Sc. Thesis in Accounting, Swedish School of Economics and Business Administration. http://www.pafis.shh.fi/graduates/supsir01.pdf (Accessed: 21 February 2008 ).