<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>e-Government Controls in Service-Oriented Auditing Perspective: Beyond Single Window</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Faiza Allah Bukhsh</string-name>
          <email>f.a.bukhsh@uvt.nl</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Hans Weigand</string-name>
          <email>h.weigand@uvt.nl</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Dept. Information Management, Tilburg University</institution>
          ,
          <addr-line>P.O.Box 90153, Tilburg</addr-line>
          ,
          <country country="NL">The Netherlands</country>
        </aff>
      </contrib-group>
      <fpage>76</fpage>
      <lpage>90</lpage>
      <abstract>
        <p>To reduce cost and e ort, e-government is trying to maximize the digital interaction with its citizens. E-customs is a carry-over of such an e ort. Worldwide Customs is transforming from the labor intensive paper work it used to be for ages to e-customs, where international trade is facilitated fully exploiting the global digital infrastructure of the 21st Century. Service-Oriented Auditing (SOAu), is a label for high-tech auditing services based on the Service-Oriented Architecture. In this paper, the question is addressed what the impact of SOAu is on the relationship between government (e-customs) and business (trading companies), and vice versa. Currently, we are already observing a shift in the distribution of responsibilities (so-called horizontal supervision). We show how this shift can be leveraged by further developments in SOAu. Another issue is coordination. There is a need for increased coordination. We explore di erent coordination mechanisms to support this development.</p>
      </abstract>
      <kwd-group>
        <kwd>Auditing</kwd>
        <kwd>Customs Control</kwd>
        <kwd>Service-Oriented Architecture</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        To reduce the burden on the front-o ce in government organizations the concept
of e-government has been introduced. In E-government, most of the government
functions and processes are carried out in the digital form over the Internet.
Over time e-government is becoming a challenge at di erent levels of public
administration. To cope with this challenge, E-government is usually managed
in terms of stages of growth and E-government architectures [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. These
architectures are based on the Service-Oriented Architecture (SOA), while SOA has
rapidly become the de-facto standard for modern information systems. SOA
helps to streamline the business processes in a highly standardized manner[
        <xref ref-type="bibr" rid="ref2 ref22 ref8">2, 8,
22</xref>
        ]. SOA is based on distributed services that together perform a collaborative
task. The Open Group[
        <xref ref-type="bibr" rid="ref29">29</xref>
        ] and OASIS [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] de ne SOA as \a paradigm for
organizing and utilizing distributed capabilities that may be under the control of
di erent ownership domains".
      </p>
      <p>
        When E-government uses SOA, this allows for a exible and adaptive
composition of services that communicate with each other via a general platform.
In recent years, the focus of SOA research has shifted to management, control
and monitoring [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]. In this line, we de ne Service Oriented Auditing (SOAu)
as the combination of SOA and Auditing. SOAu aims to realize the vision of
continuous and online monitoring of services [
        <xref ref-type="bibr" rid="ref23 ref33">33, 23</xref>
        ]. This has also relevance for
e-government.
      </p>
      <p>In this paper, we will consider the Customs and its trade facilitation as an
Egovernment organization example. Customs controls are rapidly innovating from
a labour-intensive and paper-based door-keeping function to international trade
facilitation that explore the current global digital infrastructure (e-customs).
However, the use of the modern technology concepts (like SOA, SOAu,
Monitoring, RFID) in the automation of custom control has by far not been explored
to its limits. The focus of this explorative paper is to consider the possible use
of SOA and SOAu in E-government organization, especially in custom controls,
and how SOAu in uences the relationship between government and business.
The paper is organized as follows. Section 2 gives an overview of the background
knowledge including recent developments in customs control and the Extended
Single Window (ESW) project of which our research is a part. Section 3 describes
the e-government evolution towards the service oriented architecture. Section 4
categorizes auditing con gurations in terms of coordination, audit object and
audit subject. Section 5 closes with the main conclusions and directions for future
research.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Background</title>
      <p>In this section we introduce four concepts that are at the basis of this paper.
These concepts include Custom Controls, Modernized Custom Code, Extended
Single Window, Service-Oriented Architecture and Auditing.
2.1</p>
      <sec id="sec-2-1">
        <title>Custom Controls and Modernized Customs Code</title>
        <p>The Modernized Customs Code (MCC) was adopted by the European
Communion in April 2008 but the process of realization is still enduring. The aim of
MCC is to simplify legislation and administration procedures for both customs
authorities and traders. The purposes of MCC are:
Goods Tracking: Streamline the customs procedures in such a way that it
reduces the e ort to keep track of the goods.</p>
        <p>Custom Guarantee System: Streamline and harmonies further the customs
guarantee systems
Develop Paperless Environment: Lot of paper work is needed for a simple
custom procedure. MCC will ensure the computerization of all customs
formalities, with a view to a completely `paperless environment for customs
and trade', e-customs Decision No 70/2008/EC of the Parliament and of
the Council, adopted on 15 January 2008, by (i) Electronic lodging of
customs declarations and accompanying documents as the rule (ii) Exchange of
electronic information between the national customs, and other authorities;
Centralized Clearance: Introduce and promote the concept of \centralized
clearance", by which authorized traders can declare goods electronically and
pay their customs duties at the place where they are established. These all
procedures will be irrespective of the Member State through which the goods
will be brought in or out of the EU customs territory or in which they will
be consumed.</p>
        <p>Single Window: An extension of the concept of centralized clearance by
providing the documents at a single point. It provide a base for the
development of the 'Single Window' and 'One-Stop-Shop' concepts, under which
economic operators give information on goods to only one contact point
(`Single Window' concept), even if the data should reach di erent
administrations/agencies, so that controls on them for various purposes (customs,
sanitary,...) are performed at the same time and at the same place
(`onestop-shop' concept).</p>
        <p>The concept of centralized clearance implies that when an \authorized operator"
declares at the customs o ce, this o ce carries out the documentary risk
analysis. The o ce then forwards the results of its analysis to the border customs
o ce in that Member State or in another Member State where the goods are
actually to enter or leave the Community (the `o ce of entry/exit'). Border o ce
can apply physical controls if needed. Procedures are di erent for the compliant
and trusted traders. As a bene t of centralized clearance, the goods need not to
be moved to the o ce of import or export but could be delivered directly to the
point of sale. This would allow multinational companies to conduct all of their
EU business with one customs o ce. Centralized clearance leads to the single
electronic entrance point which is called as \Single Window". In \Single
Window" authorized operators provide the information required by customs once
and then all other agencies have access to it.
2.2</p>
      </sec>
      <sec id="sec-2-2">
        <title>Extended Single Window</title>
        <p>The vision of the Extended Single Window project (ESW)1 started in 2010 is
to develop an integrated and coordinated border management solution for ports
and airports integrating with previous and subsequent procedures for reliable,
secure, and cost e ective logistic chains throughout the Netherlands as a logistic
gateway to Europe. The coordinated border management solution is referred to
as `Extended Single Window'. It requires e cient and reliable handling of data to
generate information for e ective joint supply chain planning for shippers, goods
owners, transportation companies, forwarders, terminals and other logistic
service providers. This data is also used to generate information for government
agencies, like customs, agricultural and tax. Currently, shippers and goods
owners are faced with a wide range of regulations and procedures when goods enter
or exit the EU. Completion of declaration processes and risk analyses and
planning and coordination of inspections by the various agencies before shipments
1 http://www.dinalog.nl/institute/projects/research-development-projects/
extended-single-window-information-gateway-to-europe/271
are (un)loaded from an aircraft or vessel enables logistics actors (terminal
operators, forwarders, transport operators) to plan and execute transportation of
shipments with hinterland hubs e ciently (improving modal shift, throughput
time i.e. for perishable goods and reducing congestion). E cient and reliable
government controls reduce administrative costs, increase reliability of the supply
chain, and ultimately reduce transport costs for shippers and logistic operators.
ESW project is a source for realization of all these discussed tasks.</p>
        <p>Thus, ESW covers all regulations and procedures for coordinated border
management at ports, airports and extending to hinterland hubs according to
the MCC for both incoming and outgoing logistic ows, including integration
with previous (outgoing goods for instance preceded by export) and subsequent
procedures (incoming goods for instance followed by transit). Basic research
in advanced information technologies is in Event Driven Architecture with a
Logistic Interoperability Ontology:
{ Event Driven Information Service Bus (EISB). It is an extension of the
concept of Enterprise Service Bus (ESB). Basically, each logistic operation
triggers an event. Minimally, an EISB supports publish/subscribe functionality
to events in virtual data space. Since the data space is virtual, relevant data
can still reside with each actor depending on governance and logistic
innovations at business level. Thus EISB can support traditional document-driven
processes as well as new event-driven processes for tracking and tracing of
movement of goods.
{ Logistic Interoperability Ontology Framework. It speci es the semantics of
all physical objects as shared by business actors in supply chains, e.g.
semantics of containers, goods items, and trucks thus allowing that each actor
shares only relevant information with one or more other actors.</p>
        <p>
          Using the EISB concept it is possible to extend the Single Window concept in
at least two important ways. The Single Window is based on digital documents,
whereas the ESW is based on events, which is much more exible. It is not
necessary anymore for the sender to collect the data needed in the form of document
template. The receiver speci es which data he wants to see (by subscribing to
events), and these data are collected then (that is, continuously) from the virtual
data space fed by all the distributed events. Secondly, the Single Window only
streamlines data ow in one direction, from logistic operators to government
agencies, whereas the EISB also supports data ow among logistic operators,
among government agencies (e.g. to realize a One-Stop-Shop), or from
government agencies to operators. One of the very powerful new possibilities opened
up this way is end-to-end supply chain integrity as advocated by Hesketh [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ].
2.3
        </p>
      </sec>
      <sec id="sec-2-3">
        <title>Service Oriented Architecture</title>
        <p>
          Enterprises need to respond quickly to the today's more competitive and global
market. To ful ll this purpose business needs to streamline its business
processes in highly standardized manner. A contemporary approach for addressing
these critical issues is service oriented architecture (SOA) [
          <xref ref-type="bibr" rid="ref2 ref22 ref8">2, 8, 22</xref>
          ]. \SOA is a
paradigm for organizing and utilizing distributed capabilities that may be under
the control of di erent ownership domains. Therefore providing a homogeneous
means to o er, discover, interact with and use capabilities to produce desired
e ects which are consistent with measurable pre-conditions and expectations"
[
          <xref ref-type="bibr" rid="ref18">18</xref>
          ]. SOA as an emerging approach meets the requirements of loosely coupled,
standards-based, and protocol independent computing [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ]. The enterprise
service bus provides the functionality of highly distributed communication and
integration based on event-driven and asynchronous communication. SOA can
be extended to deal with service orchestration, intelligent routing, provisioning,
integrity and security of massages as well as service management [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ]. Extended
SOA functionality is separated into three plans (i) Service foundation (ii) Service
composition (iii) Service management and monitoring [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ]. SOA and cloud
computing are complementary activities. A platform for cloud computing provides
a value-added underpinning for SOA [
          <xref ref-type="bibr" rid="ref24">24</xref>
          ], while SOA allows for optimal usage
of Software-as-a-Service (SaaS) in cloud platforms.
2.4
        </p>
      </sec>
      <sec id="sec-2-4">
        <title>Auditing</title>
        <p>
          Auditing is evaluation/monitoring/control of an organization/person/product
on the basis of some norms. Traditionally, auditing can be de ned in two
scenarios (a) an internal audit (b) external audit. According to ISA standard 2010,
internal auditing is `to monitor and evaluate the e ectiveness of an organizational
risk management and control system' [
          <xref ref-type="bibr" rid="ref37">37</xref>
          ] while in external auditing the focus
is on the assurance about the accuracy of the nancial statement and
coordination related tasks. The methods of internal and external audit are very similar,
but external audit uses xed norms, while the audit norm can be the subject
of optimization in the case of internal audit. Audit addresses the quality of the
business. Because of compliance issues organizations have to pay signi cant
attention on the management, reporting and monitoring of the business processes
[
          <xref ref-type="bibr" rid="ref6">6</xref>
          ]. Auditing is a periodic activity, where the time period and scope di ers from
one situation to another. In some organizations auditing is performed
continuously termed as continuous audit [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ]. Continuous and online auditing are very
similar but slightly di erent concepts. Online auditing means that the auditing
makes use of Internet technology for the distribution and/or acquisition of the
audit data [
          <xref ref-type="bibr" rid="ref32">32</xref>
          ]. This also gives opportunities for interactive access to the data
(drilling down). Ideally, online audit is continuous audit but continuous audit
can be realized o -line as well [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ].
3
        </p>
        <p>
          e-Government Evolution towards SOA
E-government growth has been studied in two ways: (i) content analysis of the
government web sites for speci c features of E-government [
          <xref ref-type="bibr" rid="ref10 ref28 ref36">10, 28, 36</xref>
          ], (ii) survey
among local government o cials. Moon [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ] conducted the most known survey of
government o cials . Sometimes both content method and survey methodology
have been used together.
        </p>
        <p>
          Di erent models of e-government growth have been developed. For public
administrators of e-government Layne and Lee [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ] describe di erent stages of
e-government development and propose a 'stages of growth' model for fully
functional e-government. Keeping in view the technical, organizational and
managerial feasibility and corresponding examples, four stages of growth model are: (1)
cataloging, (2) transaction, (3) vertical integration, and (4) horizontal
integration. These stages consider the citizen as a user of governmental services. These
stages describes that citizen-focused change must be considered throughout
egovernment development.
        </p>
        <p>
          The two-stage model of Reddick [
          <xref ref-type="bibr" rid="ref26">26</xref>
          ] builds forth on the four stage model.
This model of e-government growth is applied to municipalities. Stage I is the
cataloging of information online and Stage II is transactions being completed
online. These stages apply to various e-government relationships being government
to citizen (G2C), government to business (G2B), or government to government
(G2G). In this study, it appears that G2C e-government is primarily in Stage
I cataloging information, in essence, providing an online presence for cities.
Egovernment is considered more developed in the case of G2G use of internet for
government employees.
        </p>
        <p>
          Governmental agencies are trying to migrate their traditional systems
architectures to more horizontally and vertically integrated architectures. Janssen
and Veenstra [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ] describe the stages of growth model for the development of
information architectures for local governmental agencies. These stages consider
the front and back o ce in parallel. The ve-stage model consists of (1) no
integration, (2) one-to-one messaging, (3) warehouse, (4) broker and (5) orchestrated
broker architecture. The rst three stages are about integration using data
warehouses. The fourth stage not only handles information, but also starts invoking
other types of technical services. In the last growth stage, the orchestrated broker
architecture enters. This stage is specialized into SOA. Public decision-makers
can use these stages as a guidance and direction in SOA architecture
development. The stage model provides the milestones to evaluate and control the costs
of architecture development.
        </p>
        <p>
          For improving service delivery, departments and agencies have to work
together and manage the mutual information ows. Stage models can help further
e-government development. The stage model proposed by Klievink and Janssen
[
          <xref ref-type="bibr" rid="ref11">11</xref>
          ] describes the stages of development in joint-up government at national level.
It consists of following ve stages: (1) Stovepipes (2) Integrated organizations (3)
nation-wide portal (4) inter organizational integration and (5) customer-driven,
joined-up government. These stages also consider SOA.
        </p>
        <p>
          From the above, we can see that integration has always been an important
e-government concern, evolving from an intra- to an inter-organizational scope.
SOA can very well support this development, but it also requires a more holistic
view to the coordination of e-government services [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ].
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Audit with Service-Oriented Auditing</title>
      <p>
        The relationship between computer science and auditing is bi-directional. In a
computer science perspective, applications of computer science are subject to
audit, e.g. the information system infrastructure and accounting system, while in
audit perspective, IT applications are employed as a powerful means to support
risk management and auditing, for instance ACL audit software (www.acl.com)
and the AuditSystem-2 used at Deloitte (www.deloitte.com). Service oriented
auditing (SOAu) aims at the use of service-oriented technology to further
support audit processes and realize the vision of continuous and online monitoring.
In this article an audit module can be de ned with the help of the following
model proposed by Weigand and Bukhsh[
        <xref ref-type="bibr" rid="ref33">33</xref>
        ]. Fig 1 describes the overall
architecture of an audit module based on service-oriented monitoring solution. Events
[
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] generated by business services (including service request and service response
events) are published on the EISB. The continuous monitoring (CM) service
collects the events using the publish/subscribe mechanism. Then it generates the
IST (as-is) model from the event traces by means of speci ed process patterns.
Such a pattern consists of two parts: a condition part specifying selection criteria
on operational events, and a result part specifying one or more economic events,
typically de ned on a higher abstraction level, e.g. using the REA business
ontology [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. When the processing detects an operational event pattern, it generates
the corresponding economic event as IST model. The IST model contains both
compliant and non-compliant process instances from which a fault list is
generated (evaluation). The result of the evaluation can be forwarded immediately to
the stakeholder, be it Company / Government/ Concerned Authorities (push)
or made available online (pull).
      </p>
      <p>Monitoring management is a second and important component of the model
that is responsible for adapting and optimizing the rst component in the face
of internal and external changes. This activity is responsible for deriving process
patterns from a xed SOLL (normative) model, and uses process mining or other
machine-learning techniques.</p>
      <p>From a coordination perspective, we can divide the government and company
audit relationship into two categories. (i) uncoordinated: in which one company
is audited by one government authority at a time. (ii) coordinated: when many
collaborating companies are audited by many government authorities in a
coordinated action.
4.1</p>
      <sec id="sec-3-1">
        <title>Uncoordinated Auditing</title>
        <p>
          Uncoordinated means that one government authority audits one company at a
time, based on direct communication between the company (e.g. trading
company) and government authority (e.g. custom). In this category, there are again
two subcategories, depending on the audit subject: (i) government audits the
company (ii) company audits itself, reporting to the government.
Audit by the Government: Audit by Government is of detective and
corrective nature. Government want to check the status of the organization
/company's declarations and trustworthiness. Government authorities or
shareholders or investors usually perform this type of audit. They audit the assets,
controls, declarations and all the matters related to the company's stability.
Audit by the Company: In this case, the company has a rigorous internal
auditing system. According to Starreveld et al [
          <xref ref-type="bibr" rid="ref27">27</xref>
          ] organizations need
internal control measures, including organizational rules and control activities.
These internal controls are in general of a preventive nature, i.e. preventing
the occurrence of errors and opportunistic behavior of the organizational
agents. The purpose of auditing the internal controls by the company is rst
of all to implement accountability to owners and to attract investors.
Nowadays, they may also be required by partners, e.g. powerful customers who
are dependent on the quality of the company's processes. However, the very
same measures can be used to implement accountability to the government,
thus avoiding duplicated e orts.
        </p>
        <p>A company/organization provide services to its customers/users with the
help of di erent parallel or stand alone processes. We make an important
distinction between operational and control services.
Operational Service: Each operational service executes a particular activity
in the company's primary processes. Operational services consume and
produce value objects, so to safeguard value, operational processes need to be
controlled.</p>
        <p>
          Control Service: Control services implement business control on the
operational services. Control services takes place at two levels: control within
the organization and external control. Control services involve the creation
of management systems, managing the consistency and quality of products
coming to/from the company. It also involves the development of programs
and processes that operate automatically [
          <xref ref-type="bibr" rid="ref34">34</xref>
          ].
        </p>
        <p>Whereas the audit type says who is performing the audit (subject), the service
type says what is the primary focus of the audit (object). The following table
shows the four possible combinations:</p>
        <p>Audit/Service Operational Control</p>
        <p>By Company Type I Type II</p>
        <p>By Government Type III Type IV
Type I: Administration in the companies always needs to keep an eye on the
status of the company. A focus on operational processes corresponds to
traditional transaction-based auditing. Traditionally, this type is not feasible
as the government is not willing to accept the risks of abuse and fraud. It
is only willing to leave the auditing responsibility to the company when the
company is rmly in control (type II). However, with the use of (automated)
audit modules (cf. Fig. 1), the type may become acceptable. The audit
module supports a continuous monitoring service of the company's operational
services. In this way, it can detect and immune any potential operational
issue. The results can be published and made accessible to the government
agency.</p>
        <p>
          Type II: Companies arrange the audit activity especially auditing the control
services for itself to have self-assessment. This so-called system-based control
is usually more e cient and e ective than the transaction-based type. There
are other reasons for choosing this type as well. Companies with international
supply chain like to show themselves to be compliant and standardized. The
self-assessment can also replace costly governmental controls, as in the case of
custom procedures. For this purpose e-customs provides a standard known
as Authorized Economic Operator (AEO) certi cate [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ]. To get an AEO
standard company have to show customs compliance, appropriate
recordkeeping standards, nancial solvency, and appropriate security and safety
standards in place. An audit module audits the company's control services
in order to ensure compliance to the AEO standard. This module can use the
same architecture as the model in Fig.1, where the events being monitored
are now control service events (for instance, changing authorizations) rather
than operational service events.
        </p>
        <p>
          Type III: When the government audits the operational services then there are
two scenarios (i) government physically audits the operations and operational
services. This is the traditional way of working, where custom inspectors
process clearance request documents per transport and check all or a selection
of the containers passing the border. Evidently, this is a labor-intensive
process. (ii) Government audits the operational processes by using advanced
IT such as the automated scanning, audit tools [
          <xref ref-type="bibr" rid="ref33">33</xref>
          ] and/or process mining
techniques such as proposed by Van der Aalst et al [
          <xref ref-type="bibr" rid="ref31">31</xref>
          ].
        </p>
        <p>Type IV: This can be seen as a variant of type II where the company has a
rigorous internal control system, but rather than doing a self-assessment,
the government remotely monitors and evaluates the control system. This
variant may bene t both the company and the customs. Probably, it requires
an even higher level of \being in control" then in the case of type II. In
this case it is not su cient that the internal control system is compliant,
according to human interpretation, but that this compliance need to be
assessed and monitored online. In other words, the internal control system
must be highly formalized and automated. The costs that this brings for the
company can be compensated by the fact that (manual) self-assessments are
no longer needed: the company only needs to provide access to the control
services, via some interface. For the customs, it also saves costs of manual
processing of AEO reports, and may provide a higher level of security. On
the other hand, it requires sophisticated audit tools. It is also important that
the interfaces are well-de ned and based on standards.
4.2</p>
      </sec>
      <sec id="sec-3-2">
        <title>Coordinated Auditing</title>
        <p>
          Growing trade and increased security require new controls. In parallel
government would like to reduce the administrative burden. E-customs supports
simplied paperless trade procedures, prevents potential security threats and
counterfeit tax related frauds and also ensures the interoperability with other e-customs
systems within and outside the Europe. The use of SOA in e-customs [
          <xref ref-type="bibr" rid="ref25">25</xref>
          ] helps
us to access to the location of goods through its supply chain, the provision of
evidence for import/export, the noti cation through alerts in case of exceptions,
for example deviation from the planned trajectory, abnormal conditions for
containers and others. With the still growing world-wide trade, no single company
can ful ll all needs so it has to collaborate and cooperate with other companies.
In this context, coordination emerges as a separate service.
        </p>
        <p>
          Coordination Service: Co-ordination services can be de ned as services
supporting an exchange process (a set of events) for a good or a service [
          <xref ref-type="bibr" rid="ref34">34</xref>
          ].
Processes like identi cation, negotiation, order execution and after-sales take
place in a good exchange as well as a service exchange. Within this process,
a distinction can be made between core services - the transfer of goods,
services or money - and coordination services that support the process and
manage the dependencies between activities [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ].
        </p>
        <p>
          Weigand et al [
          <xref ref-type="bibr" rid="ref35">35</xref>
          ], describe a user-centric service coordination cycle that assumes
a consumer who interacts with multiple service providers who in turn o er some
real-world service as part of a service bundle. Dependencies between activities
arise, among others, from the occurrence of shared resources. For instance, when
a consumer wants to use a hotel service and a ight service, a shared resource
is the physical person himself, who can be at only one place in a given time. In
the case of international trade and custom procedures, a shared resource is the
container in question. This creates a need for coordination.
        </p>
        <p>Next to the co-ordination among the companies in the chain there are
multiple government authorities who audit them. Suppose there are n government
authorities to audit m companies. In total there will be n:m combination of
audits. This will cost lot of e ort and time from government authorities. To
overcome this issue, the concept of trusted third part may be adopted. Fig 2
explains the scenario.
Audit by Third Party: In this scenario there is a third party who is
trustworthy for both company as well as Government/ Investor/ Concerned
Authorities. Government selects the trusted third party based on some standards
and certi cations. The third party audits the company, combining the
different requirements from di erent government agencies, and takes a chain
perspective rather than focusing on one company only. The type of audit
is of detective, corrective and preventive nature. The audit information can
be used by the company itself (it has outsourced its auditing so to say). If
Government requires audit information then it can extract this online from
the third party's interactive interface. Since the third party is external to
both the Government and the company, it can manage the coordination of
audit activities.</p>
        <p>
          The concept of third-party can be implemented in several ways. In market
economies, it is not realistic to assume that there will be a single third-party.
Several competing and complementary companies will try to play part of this
role. So it is better to talk about a third party network rather than a third party
actor. Within such a network there may even be opportunities for a fourth-party
actor concept as this also exists in logistics [
          <xref ref-type="bibr" rid="ref30">30</xref>
          ].
        </p>
        <p>Assuming a coordinated auditing approach, three coordination types can be
distinguished, from minimal to maximal (Table 2)</p>
        <p>Coordination Type Coordination Level Coordination by</p>
        <p>Type A Minimal Company
Type B Partial Government
Type C Maximal Third Party
Type A: When coordination is not an assigned function. It means N
government authorities will audit M number of companies independently. The lack
of coordination results in ine ciencies and problems that the company must
try to solve.</p>
        <p>Type B: When there is data and information sharing/coordination between
the government authorities, as in the one-stop government concept There
may also be chain coordination between the companies, but the two are not
integrated.. In the e-customs domain, this type should involve not only data
sharing but also coordination of inspection activities. For companies that are
currently in type A, this type B is a big improvement.</p>
        <p>
          Type C: In this type there is overall coordination between the companies and
as well as between the government authorities. This implies that not only
companies have a single access point to various government services, but
also that the government has a single access point to a logistic chain or
business network. In this case, coordination is maximal. This type can only
be realized by the support of intermediary third parties. It also requires that
the government is willing to retreat from its role of \sole care taker" to the
one of Service Provider/Network Manager [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ].
5
        </p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Conclusion</title>
      <p>SOA is a basic architecture for integrating global services. Audit in
combination with SOA provides a massive potential of innovation. In this paper we have
introduced SOAu as a new area of research within the domain of Information
Systems. In order to explore the applicability of SOAu we have developed a
categorization of auditing approaches based on three dimensions: the audit object,
the audit subject and the coordination level. The Single Window concept
represents one type (B, III and IV). Di erent government authorities coordinate
among each other and share the company data. When companies and
government authorities coordinate with the help of a third party then the concept of
ESW comes into play. Type C in combination with any one of type I, II, III, IV
provide di erent possible variants of ESW. This paper introduces the concept of
SOAu a basic categorization of application possibilities in e-customs. Evaluation
of the viability of these types and the respective IT requirements is an open
question for further research that we want to pursue together with the ESW
industrial partners.</p>
    </sec>
    <sec id="sec-5">
      <title>Acknowledgment</title>
      <p>This research is partially supported by the DINALOG (www.dinalog.nl) project
\Extended Single Window".</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>1. http://www.gs1.org/gsmp/kc/epcglobal/epcis.</mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>J.</given-names>
            <surname>Bih</surname>
          </string-name>
          .
          <article-title>Service oriented architecture (SOA) a new paradigm to implement dynamic e-business solutions</article-title>
          .
          <source>Ubiquity</source>
          ,
          <source>2006(August)</source>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>F.</given-names>
            <surname>Dal-Ri Murcia</surname>
          </string-name>
          , F. Cruz de Souza,
          <string-name>
            <given-names>J. Alonso</given-names>
            <surname>Borba</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Ykeda</surname>
          </string-name>
          .
          <article-title>Continuous auditing: A literature review</article-title>
          .
          <source>In International Conference on Information Systems and Technology Management</source>
          , volume
          <volume>1</volume>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>W.</given-names>
            <surname>Davidow</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Malone</surname>
          </string-name>
          .
          <article-title>The virtual corporation: Structuring and revitalizing the corporation for the 21st century</article-title>
          .
          <source>HarperBusiness</source>
          ,
          <year>1993</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>European</given-names>
            <surname>Union</surname>
          </string-name>
          .
          <source>European custom code</source>
          ,
          <source>2008. Retrieved on January 11</source>
          ,
          <year>2011</year>
          from http://ec.europa.eu/taxation_customs/customs/policy_ issues/customs_security/aeo/index_en.htm.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>A.</given-names>
            <surname>Ghose</surname>
          </string-name>
          and
          <string-name>
            <given-names>G.</given-names>
            <surname>Koliadis</surname>
          </string-name>
          .
          <article-title>Auditing business process compliance</article-title>
          . In B.
          <string-name>
            <surname>Krmer</surname>
          </string-name>
          ,
          <string-name>
            <surname>K.-J. Lin</surname>
          </string-name>
          , and P. Narasimhan, editors,
          <source>Service-Oriented Computing ICSOC</source>
          <year>2007</year>
          , volume
          <volume>4749</volume>
          of Lecture Notes in Computer Science, pages
          <volume>169</volume>
          {
          <fpage>180</fpage>
          . Springer Berlin / Heidelberg,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>D.</given-names>
            <surname>Hesketh</surname>
          </string-name>
          .
          <article-title>Seamless electronic data and logistics pipelines shift focus from import declarations to start of commercial transaction</article-title>
          .
          <source>World Customs Journal</source>
          ,
          <volume>3</volume>
          (
          <issue>1</issue>
          ):
          <volume>27</volume>
          {
          <fpage>32</fpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>J.</given-names>
            <surname>Hurwitz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Bloor</surname>
          </string-name>
          , M. Kaufman, and
          <string-name>
            <given-names>F.</given-names>
            <surname>Halper</surname>
          </string-name>
          .
          <article-title>Service Oriented Architecture (SOA) for Dummies</article-title>
          .
          <source>For Dummies</source>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>M.</given-names>
            <surname>Janssen</surname>
          </string-name>
          and
          <string-name>
            <surname>A. F. Van Veenstra.</surname>
          </string-name>
          <article-title>Stages of growth in e-government: An architectural approach</article-title>
          .
          <source>The electronic journal of e-government</source>
          ,
          <volume>3</volume>
          :
          <fpage>193</fpage>
          {
          <fpage>200</fpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>C. Kaylor</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Deshazo</surname>
            , and
            <given-names>D. Van</given-names>
          </string-name>
          <string-name>
            <surname>Eck. Gauging</surname>
          </string-name>
          e
          <article-title>-government: A report on implementing services among american cities</article-title>
          .
          <source>Government Information Quarterly</source>
          ,
          <volume>18</volume>
          (
          <issue>4</issue>
          ):
          <volume>293</volume>
          {
          <fpage>307</fpage>
          ,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <given-names>B.</given-names>
            <surname>Klievink</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Janssen</surname>
          </string-name>
          .
          <article-title>Stage models for creating joined-up government: From local to nation-wide integration</article-title>
          .
          <source>In Proceedings of the 2008 international conference on Digital government research</source>
          , pages
          <volume>117</volume>
          {
          <fpage>123</fpage>
          . Digital Government Society of North America,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <given-names>B.</given-names>
            <surname>Klievink</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Janssen. Coordinating</surname>
          </string-name>
          e
          <article-title>-government service delivery</article-title>
          .
          <source>In Proceedings of the 11th Annual International Digital Government Research Conference on Public Administration Online: Challenges and Opportunities</source>
          , pages
          <volume>209</volume>
          {
          <fpage>216</fpage>
          . Digital Government Society of North America,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <given-names>R.</given-names>
            <surname>Klischewski</surname>
          </string-name>
          .
          <article-title>Drift or shift? propositions for changing roles of administrations in e-government</article-title>
          .
          <source>Electronic Government</source>
          , pages
          <volume>85</volume>
          {
          <fpage>96</fpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>J. Kuhn</surname>
            Jr and
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Sutton</surname>
          </string-name>
          .
          <article-title>Continuous auditing in erp system environments: The current state and future directions</article-title>
          .
          <source>Journal of Information Systems</source>
          ,
          <volume>24</volume>
          :
          <fpage>91</fpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <given-names>K.</given-names>
            <surname>Layne</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Lee</surname>
          </string-name>
          .
          <article-title>Developing fully functional e-government: A four stage model</article-title>
          .
          <source>Government information quarterly</source>
          ,
          <volume>18</volume>
          (
          <issue>2</issue>
          ):
          <volume>122</volume>
          {
          <fpage>136</fpage>
          ,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <given-names>W.</given-names>
            <surname>McCarthy</surname>
          </string-name>
          .
          <article-title>The REA accounting model: A generalized framework for accounting systems in a shared data environment</article-title>
          .
          <source>The Accounting Review</source>
          ,
          <volume>57</volume>
          (
          <issue>3</issue>
          ):
          <volume>554</volume>
          {
          <fpage>578</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17. M. Moon.
          <article-title>The evolution of e-government among municipalities: Rhetoric or reality? Public administration review</article-title>
          ,
          <volume>62</volume>
          (
          <issue>4</issue>
          ):
          <volume>424</volume>
          {
          <fpage>433</fpage>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18. OASIS.
          <article-title>OASIS SOA reference model (http://www</article-title>
          .oasis-open.
          <source>org)</source>
          ,
          <source>2011. Retrieved on March 20</source>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>M. Papazoglou</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Traverso</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Dustdar</surname>
            , and
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Leymann</surname>
          </string-name>
          .
          <article-title>Service-oriented computing: State of the art and research challenges</article-title>
          .
          <source>Computer</source>
          ,
          <volume>40</volume>
          (
          <issue>11</issue>
          ):
          <volume>38</volume>
          {
          <fpage>45</fpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <given-names>M.</given-names>
            <surname>Papazoglou</surname>
          </string-name>
          and
          <string-name>
            <surname>W. Van Den Heuvel.</surname>
          </string-name>
          <article-title>Service oriented architectures: approaches, technologies and research issues</article-title>
          .
          <source>The VLDB Journal</source>
          ,
          <volume>16</volume>
          (
          <issue>3</issue>
          ):
          <volume>389</volume>
          {
          <fpage>415</fpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <given-names>M. P.</given-names>
            <surname>Papazoglou</surname>
          </string-name>
          .
          <article-title>Extending the service-oriented architecture</article-title>
          .
          <source>Business integration journal</source>
          ,
          <volume>7</volume>
          :
          <fpage>18</fpage>
          {
          <fpage>21</fpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <given-names>M. P.</given-names>
            <surname>Papazoglou</surname>
          </string-name>
          and
          <string-name>
            <given-names>W.-J. V. D.</given-names>
            <surname>Heuvel</surname>
          </string-name>
          .
          <article-title>Service-oriented design and development methodology</article-title>
          .
          <source>Int. J. Web Eng. Technol.</source>
          ,
          <volume>2</volume>
          :
          <fpage>412</fpage>
          {
          <fpage>442</fpage>
          ,
          <year>July 2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <given-names>S.</given-names>
            <surname>Popa</surname>
          </string-name>
          and
          <string-name>
            <given-names>C.</given-names>
            <surname>Ionescu</surname>
          </string-name>
          .
          <article-title>Towards online auditing.the database environment</article-title>
          .
          <source>In II International Seminar on IT Audit</source>
          . Nanjing,China,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24. G. Raines.
          <article-title>Cloud computing and SOA</article-title>
          . available at: http://www.mitre.org/work/ tech_papers/tech_papers_
          <volume>09</volume>
          /09_0743/09_0743.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <given-names>L.</given-names>
            <surname>Razmerita</surname>
          </string-name>
          and
          <string-name>
            <given-names>N.</given-names>
            <surname>Bjorn-Andersen</surname>
          </string-name>
          .
          <article-title>Towards ubiquitous e-custom services</article-title>
          .
          <source>In Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence</source>
          ,
          <string-name>
            <surname>WI</surname>
          </string-name>
          <year>2007</year>
          , pages
          <fpage>833</fpage>
          {
          <fpage>837</fpage>
          . IEEE Computer Society,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <given-names>C.</given-names>
            <surname>Reddick</surname>
          </string-name>
          .
          <article-title>A two-stage model of e-government growth: Theories and empirical evidence for US cities</article-title>
          .
          <source>Government Information Quarterly</source>
          ,
          <volume>21</volume>
          (
          <issue>1</issue>
          ):
          <volume>51</volume>
          {
          <fpage>64</fpage>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <given-names>R.</given-names>
            <surname>Starreveld</surname>
          </string-name>
          , H. de Mare, and
          <string-name>
            <given-names>E.</given-names>
            <surname>Joels</surname>
          </string-name>
          .
          <article-title>Bestuurlijke informatieverzorging: Algemene grondslagen</article-title>
          .
          <source>Samsom</source>
          ,
          <year>1985</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28. G. Stowers.
          <article-title>Becoming cyberactive: State and local governments on the world wide web</article-title>
          .
          <source>Government Information Quarterly</source>
          ,
          <volume>16</volume>
          (
          <issue>2</issue>
          ):
          <volume>111</volume>
          {
          <fpage>127</fpage>
          ,
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29. The Open Group.
          <article-title>SOA work group member site (https://www</article-title>
          .opengroup.org/ projects/soa/),
          <year>2011</year>
          .
          <source>Retrieved on March 20</source>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <given-names>G.</given-names>
            <surname>Vaidyanathan</surname>
          </string-name>
          .
          <article-title>A framework for evaluating third-party logistics</article-title>
          .
          <source>Commun. ACM</source>
          ,
          <volume>48</volume>
          :
          <fpage>89</fpage>
          {
          <fpage>94</fpage>
          ,
          <year>January 2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31. W. van Aalst,
          <string-name>
            <surname>K. Van Hee</surname>
            ,
            <given-names>J. Van Werf</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>and M.</given-names>
            <surname>Verdonk</surname>
          </string-name>
          .
          <article-title>Auditing 2.0: Using process mining to support tomorrow's auditor</article-title>
          .
          <source>Computer</source>
          ,
          <volume>43</volume>
          (
          <issue>3</issue>
          ):
          <volume>90</volume>
          {
          <fpage>93</fpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <surname>W. Van Der Aalst</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          <string-name>
            <surname>Van Hee</surname>
            ,
            <given-names>J. Van Der</given-names>
          </string-name>
          <string-name>
            <surname>Werf</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Kumar</surname>
            , and
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Verdonk</surname>
          </string-name>
          .
          <article-title>Conceptual model for online auditing</article-title>
          .
          <source>Decision Support Systems</source>
          ,
          <volume>50</volume>
          (
          <issue>3</issue>
          ):
          <volume>636</volume>
          {
          <fpage>647</fpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          33.
          <string-name>
            <given-names>H.</given-names>
            <surname>Weigand</surname>
          </string-name>
          and
          <string-name>
            <given-names>F. A.</given-names>
            <surname>Bukhsh</surname>
          </string-name>
          .
          <article-title>Supporting customs controls by means of serviceoriented auditing</article-title>
          . manuscript Department of Information Management, University of Tilburg,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          34. H.
          <string-name>
            <surname>Weigand</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Johannesson</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <string-name>
            <surname>Andersson</surname>
            ,
            <given-names>J. J.</given-names>
          </string-name>
          <string-name>
            <surname>Arachchige</surname>
            , and
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Bergholtz</surname>
          </string-name>
          .
          <article-title>Management service - a framework for design</article-title>
          .
          <source>In Proceeding of 23rd International Conference on Advanced Information Systems Engineering published in Lecture Notes in Computer Science</source>
          ,
          <year>2011</year>
          . accepted.
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          35. H.
          <string-name>
            <surname>Weigand</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Johannesson</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <string-name>
            <surname>Andersson</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Bergholtz</surname>
            , and
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Arachchige</surname>
          </string-name>
          .
          <article-title>Closing the user-centric service coordination cycle by means of coordination services</article-title>
          .
          <source>Lecture Notes in Business Information Processing</source>
          ,
          <volume>72</volume>
          LNBIP:
          <volume>267</volume>
          {
          <fpage>282</fpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          36. D.
          <article-title>West and Taubman Center for Public Policy</article-title>
          .
          <article-title>Urban e-government: An assessment of city government websites. Taubman Center for Public Policy</article-title>
          , Brown University,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          37.
          <string-name>
            <given-names>S. W.</given-names>
            <surname>Zarkasyi</surname>
          </string-name>
          .
          <article-title>International audit techniques traditional versus progressive approach</article-title>
          .
          <source>Jurnal Ekonomi dan Bisnis Terapan</source>
          ,
          <volume>2</volume>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>