<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">e-Government Controls in Service-Oriented Auditing Perspective: Beyond Single Window</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Faiza</forename><forename type="middle">Allah</forename><surname>Bukhsh</surname></persName>
							<email>f.a.bukhsh@uvt.nl</email>
							<affiliation key="aff0">
								<orgName type="department">Dept. Information Management</orgName>
								<orgName type="institution">Tilburg University</orgName>
								<address>
									<postBox>P.O.Box 90153</postBox>
									<settlement>Tilburg</settlement>
									<country key="NL">The Netherlands</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Hans</forename><surname>Weigand</surname></persName>
							<email>h.weigand@uvt.nl</email>
							<affiliation key="aff0">
								<orgName type="department">Dept. Information Management</orgName>
								<orgName type="institution">Tilburg University</orgName>
								<address>
									<postBox>P.O.Box 90153</postBox>
									<settlement>Tilburg</settlement>
									<country key="NL">The Netherlands</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">e-Government Controls in Service-Oriented Auditing Perspective: Beyond Single Window</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">DA5FF591377F018A7ABEC0E0A285DCE2</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T22:16+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Auditing</term>
					<term>Customs Control</term>
					<term>Service-Oriented Architecture</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>To reduce cost and effort, e-government is trying to maximize the digital interaction with its citizens. E-customs is a carry-over of such an effort. Worldwide Customs is transforming from the labor intensive paper work it used to be for ages to e-customs, where international trade is facilitated fully exploiting the global digital infrastructure of the 21st Century. Service-Oriented Auditing (SOAu), is a label for high-tech auditing services based on the Service-Oriented Architecture. In this paper, the question is addressed what the impact of SOAu is on the relationship between government (e-customs) and business (trading companies), and vice versa. Currently, we are already observing a shift in the distribution of responsibilities (so-called horizontal supervision). We show how this shift can be leveraged by further developments in SOAu. Another issue is coordination. There is a need for increased coordination. We explore different coordination mechanisms to support this development.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>To reduce the burden on the front-office in government organizations the concept of e-government has been introduced. In E-government, most of the government functions and processes are carried out in the digital form over the Internet. Over time e-government is becoming a challenge at different levels of public administration. To cope with this challenge, E-government is usually managed in terms of stages of growth and E-government architectures <ref type="bibr" target="#b7">[9]</ref>. These architectures are based on the Service-Oriented Architecture (SOA), while SOA has rapidly become the de-facto standard for modern information systems. SOA helps to streamline the business processes in a highly standardized manner <ref type="bibr" target="#b0">[2,</ref><ref type="bibr" target="#b6">8,</ref><ref type="bibr" target="#b20">22]</ref>. SOA is based on distributed services that together perform a collaborative task. The Open Group <ref type="bibr" target="#b27">[29]</ref> and OASIS <ref type="bibr" target="#b16">[18]</ref> define SOA as "a paradigm for organizing and utilizing distributed capabilities that may be under the control of different ownership domains".</p><p>When E-government uses SOA, this allows for a flexible and adaptive composition of services that communicate with each other via a general platform.</p><p>In recent years, the focus of SOA research has shifted to management, control and monitoring <ref type="bibr" target="#b18">[20]</ref>. In this line, we define Service Oriented Auditing (SOAu) as the combination of SOA and Auditing. SOAu aims to realize the vision of continuous and online monitoring of services <ref type="bibr" target="#b31">[33,</ref><ref type="bibr" target="#b21">23]</ref>. This has also relevance for e-government.</p><p>In this paper, we will consider the Customs and its trade facilitation as an Egovernment organization example. Customs controls are rapidly innovating from a labour-intensive and paper-based door-keeping function to international trade facilitation that explore the current global digital infrastructure (e-customs). However, the use of the modern technology concepts (like SOA, SOAu, Monitoring, RFID) in the automation of custom control has by far not been explored to its limits. The focus of this explorative paper is to consider the possible use of SOA and SOAu in E-government organization, especially in custom controls, and how SOAu influences the relationship between government and business. The paper is organized as follows. Section 2 gives an overview of the background knowledge including recent developments in customs control and the Extended Single Window (ESW) project of which our research is a part. Section 3 describes the e-government evolution towards the service oriented architecture. Section 4 categorizes auditing configurations in terms of coordination, audit object and audit subject. Section 5 closes with the main conclusions and directions for future research.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Background</head><p>In this section we introduce four concepts that are at the basis of this paper. These concepts include Custom Controls, Modernized Custom Code, Extended Single Window, Service-Oriented Architecture and Auditing.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">Custom Controls and Modernized Customs Code</head><p>The Modernized Customs Code (MCC) was adopted by the European Communion in April 2008 but the process of realization is still enduring. The aim of MCC is to simplify legislation and administration procedures for both customs authorities and traders. The purposes of MCC are:</p><p>Goods Tracking: Streamline the customs procedures in such a way that it reduces the effort to keep track of the goods. Custom Guarantee System: Streamline and harmonies further the customs guarantee systems Develop Paperless Environment: Lot of paper work is needed for a simple custom procedure. MCC will ensure the computerization of all customs formalities, with a view to a completely 'paperless environment for customs and trade', e-customs Decision No 70/2008/EC of the Parliament and of the Council, adopted on 15 January 2008, by (i) Electronic lodging of customs declarations and accompanying documents as the rule (ii) Exchange of electronic information between the national customs, and other authorities;</p><p>Centralized Clearance: Introduce and promote the concept of "centralized clearance", by which authorized traders can declare goods electronically and pay their customs duties at the place where they are established. These all procedures will be irrespective of the Member State through which the goods will be brought in or out of the EU customs territory or in which they will be consumed. Single Window: An extension of the concept of centralized clearance by providing the documents at a single point. It provide a base for the development of the 'Single Window' and 'One-Stop-Shop' concepts, under which economic operators give information on goods to only one contact point ('Single Window' concept), even if the data should reach different administrations/agencies, so that controls on them for various purposes (customs, sanitary,...) are performed at the same time and at the same place ('onestop-shop' concept).</p><p>The concept of centralized clearance implies that when an "authorized operator" declares at the customs office, this office carries out the documentary risk analysis. The office then forwards the results of its analysis to the border customs office in that Member State or in another Member State where the goods are actually to enter or leave the Community (the 'office of entry/exit'). Border office can apply physical controls if needed. Procedures are different for the compliant and trusted traders. As a benefit of centralized clearance, the goods need not to be moved to the office of import or export but could be delivered directly to the point of sale. This would allow multinational companies to conduct all of their EU business with one customs office. Centralized clearance leads to the single electronic entrance point which is called as "Single Window". In "Single Window" authorized operators provide the information required by customs once and then all other agencies have access to it.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">Extended Single Window</head><p>The vision of the Extended Single Window project (ESW) 1 started in 2010 is to develop an integrated and coordinated border management solution for ports and airports integrating with previous and subsequent procedures for reliable, secure, and cost effective logistic chains throughout the Netherlands as a logistic gateway to Europe. The coordinated border management solution is referred to as 'Extended Single Window'. It requires efficient and reliable handling of data to generate information for effective joint supply chain planning for shippers, goods owners, transportation companies, forwarders, terminals and other logistic service providers. This data is also used to generate information for government agencies, like customs, agricultural and tax. Currently, shippers and goods owners are faced with a wide range of regulations and procedures when goods enter or exit the EU. Completion of declaration processes and risk analyses and planning and coordination of inspections by the various agencies before shipments are (un)loaded from an aircraft or vessel enables logistics actors (terminal operators, forwarders, transport operators) to plan and execute transportation of shipments with hinterland hubs efficiently (improving modal shift, throughput time i.e. for perishable goods and reducing congestion). Efficient and reliable government controls reduce administrative costs, increase reliability of the supply chain, and ultimately reduce transport costs for shippers and logistic operators. ESW project is a source for realization of all these discussed tasks. Thus, ESW covers all regulations and procedures for coordinated border management at ports, airports and extending to hinterland hubs according to the MCC for both incoming and outgoing logistic flows, including integration with previous (outgoing goods for instance preceded by export) and subsequent procedures (incoming goods for instance followed by transit). Basic research in advanced information technologies is in Event Driven Architecture with a Logistic Interoperability Ontology:</p><p>-Event Driven Information Service Bus (EISB). It is an extension of the concept of Enterprise Service Bus (ESB). Basically, each logistic operation triggers an event. Minimally, an EISB supports publish/subscribe functionality to events in virtual data space. Since the data space is virtual, relevant data can still reside with each actor depending on governance and logistic innovations at business level. Thus EISB can support traditional document-driven processes as well as new event-driven processes for tracking and tracing of movement of goods. -Logistic Interoperability Ontology Framework. It specifies the semantics of all physical objects as shared by business actors in supply chains, e.g. semantics of containers, goods items, and trucks thus allowing that each actor shares only relevant information with one or more other actors.</p><p>Using the EISB concept it is possible to extend the Single Window concept in at least two important ways. The Single Window is based on digital documents, whereas the ESW is based on events, which is much more flexible. It is not necessary anymore for the sender to collect the data needed in the form of document template. The receiver specifies which data he wants to see (by subscribing to events), and these data are collected then (that is, continuously) from the virtual data space fed by all the distributed events. Secondly, the Single Window only streamlines data flow in one direction, from logistic operators to government agencies, whereas the EISB also supports data flow among logistic operators, among government agencies (e.g. to realize a One-Stop-Shop), or from government agencies to operators. One of the very powerful new possibilities opened up this way is end-to-end supply chain integrity as advocated by Hesketh <ref type="bibr" target="#b5">[7]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3">Service Oriented Architecture</head><p>Enterprises need to respond quickly to the today's more competitive and global market. To fulfill this purpose business needs to streamline its business processes in highly standardized manner. A contemporary approach for addressing these critical issues is service oriented architecture (SOA) <ref type="bibr" target="#b0">[2,</ref><ref type="bibr" target="#b6">8,</ref><ref type="bibr" target="#b20">22]</ref>. "SOA is a paradigm for organizing and utilizing distributed capabilities that may be under the control of different ownership domains. Therefore providing a homogeneous means to offer, discover, interact with and use capabilities to produce desired effects which are consistent with measurable pre-conditions and expectations" <ref type="bibr" target="#b16">[18]</ref>. SOA as an emerging approach meets the requirements of loosely coupled, standards-based, and protocol independent computing <ref type="bibr" target="#b18">[20]</ref>. The enterprise service bus provides the functionality of highly distributed communication and integration based on event-driven and asynchronous communication. SOA can be extended to deal with service orchestration, intelligent routing, provisioning, integrity and security of massages as well as service management <ref type="bibr" target="#b19">[21]</ref>. Extended SOA functionality is separated into three plans (i) Service foundation (ii) Service composition (iii) Service management and monitoring <ref type="bibr" target="#b17">[19]</ref>. SOA and cloud computing are complementary activities. A platform for cloud computing provides a value-added underpinning for SOA <ref type="bibr" target="#b22">[24]</ref>, while SOA allows for optimal usage of Software-as-a-Service (SaaS) in cloud platforms.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.4">Auditing</head><p>Auditing is evaluation/monitoring/control of an organization/person/product on the basis of some norms. Traditionally, auditing can be defined in two scenarios (a) an internal audit (b) external audit. According to ISA standard 2010, internal auditing is 'to monitor and evaluate the effectiveness of an organizational risk management and control system' <ref type="bibr" target="#b35">[37]</ref> while in external auditing the focus is on the assurance about the accuracy of the financial statement and coordination related tasks. The methods of internal and external audit are very similar, but external audit uses fixed norms, while the audit norm can be the subject of optimization in the case of internal audit. Audit addresses the quality of the business. Because of compliance issues organizations have to pay significant attention on the management, reporting and monitoring of the business processes <ref type="bibr" target="#b4">[6]</ref>. Auditing is a periodic activity, where the time period and scope differs from one situation to another. In some organizations auditing is performed continuously termed as continuous audit <ref type="bibr" target="#b1">[3]</ref>. Continuous and online auditing are very similar but slightly different concepts. Online auditing means that the auditing makes use of Internet technology for the distribution and/or acquisition of the audit data <ref type="bibr" target="#b30">[32]</ref>. This also gives opportunities for interactive access to the data (drilling down). Ideally, online audit is continuous audit but continuous audit can be realized off-line as well <ref type="bibr" target="#b12">[14]</ref>.</p><p>3 e-Government Evolution towards SOA E-government growth has been studied in two ways: (i) content analysis of the government web sites for specific features of E-government <ref type="bibr" target="#b8">[10,</ref><ref type="bibr" target="#b26">28,</ref><ref type="bibr" target="#b34">36]</ref>, (ii) survey among local government officials. Moon <ref type="bibr" target="#b15">[17]</ref> conducted the most known survey of government officials . Sometimes both content method and survey methodology have been used together.</p><p>Different models of e-government growth have been developed. For public administrators of e-government Layne and Lee <ref type="bibr" target="#b13">[15]</ref> describe different stages of e-government development and propose a 'stages of growth' model for fully functional e-government. Keeping in view the technical, organizational and managerial feasibility and corresponding examples, four stages of growth model are: (1) cataloging, (2) transaction, (3) vertical integration, and (4) horizontal integration. These stages consider the citizen as a user of governmental services. These stages describes that citizen-focused change must be considered throughout egovernment development.</p><p>The two-stage model of Reddick <ref type="bibr" target="#b24">[26]</ref> builds forth on the four stage model. This model of e-government growth is applied to municipalities. Stage I is the cataloging of information online and Stage II is transactions being completed online. These stages apply to various e-government relationships being government to citizen (G2C), government to business (G2B), or government to government (G2G). In this study, it appears that G2C e-government is primarily in Stage I cataloging information, in essence, providing an online presence for cities. Egovernment is considered more developed in the case of G2G use of internet for government employees.</p><p>Governmental agencies are trying to migrate their traditional systems architectures to more horizontally and vertically integrated architectures. Janssen and Veenstra <ref type="bibr" target="#b7">[9]</ref> describe the stages of growth model for the development of information architectures for local governmental agencies. These stages consider the front and back office in parallel. The five-stage model consists of (1) no integration, (2) one-to-one messaging, (3) warehouse, (4) broker and (5) orchestrated broker architecture. The first three stages are about integration using data warehouses. The fourth stage not only handles information, but also starts invoking other types of technical services. In the last growth stage, the orchestrated broker architecture enters. This stage is specialized into SOA. Public decision-makers can use these stages as a guidance and direction in SOA architecture development. The stage model provides the milestones to evaluate and control the costs of architecture development.</p><p>For improving service delivery, departments and agencies have to work together and manage the mutual information flows. Stage models can help further e-government development. The stage model proposed by Klievink and Janssen <ref type="bibr" target="#b9">[11]</ref> describes the stages of development in joint-up government at national level. It consists of following five stages: (1) Stovepipes (2) Integrated organizations (3) nation-wide portal (4) inter organizational integration and (5) customer-driven, joined-up government. These stages also consider SOA.</p><p>From the above, we can see that integration has always been an important e-government concern, evolving from an intra-to an inter-organizational scope. SOA can very well support this development, but it also requires a more holistic view to the coordination of e-government services <ref type="bibr" target="#b10">[12]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Audit with Service-Oriented Auditing</head><p>The relationship between computer science and auditing is bi-directional. In a computer science perspective, applications of computer science are subject to audit, e.g. the information system infrastructure and accounting system, while in audit perspective, IT applications are employed as a powerful means to support risk management and auditing, for instance ACL audit software (www.acl.com) and the AuditSystem-2 used at Deloitte (www.deloitte.com). Service oriented auditing (SOAu) aims at the use of service-oriented technology to further support audit processes and realize the vision of continuous and online monitoring. In this article an audit module can be defined with the help of the following model proposed by Weigand and Bukhsh <ref type="bibr" target="#b31">[33]</ref>.  tecture of an audit module based on service-oriented monitoring solution. Events [1] generated by business services (including service request and service response events) are published on the EISB. The continuous monitoring (CM) service collects the events using the publish/subscribe mechanism. Then it generates the IST (as-is) model from the event traces by means of specified process patterns. Such a pattern consists of two parts: a condition part specifying selection criteria on operational events, and a result part specifying one or more economic events, typically defined on a higher abstraction level, e.g. using the REA business ontology <ref type="bibr" target="#b14">[16]</ref>. When the processing detects an operational event pattern, it generates the corresponding economic event as IST model. The IST model contains both compliant and non-compliant process instances from which a fault list is generated (evaluation). The result of the evaluation can be forwarded immediately to the stakeholder, be it Company / Government/ Concerned Authorities (push) or made available online (pull).</p><p>Monitoring management is a second and important component of the model that is responsible for adapting and optimizing the first component in the face of internal and external changes. This activity is responsible for deriving process patterns from a fixed SOLL (normative) model, and uses process mining or other machine-learning techniques.</p><p>From a coordination perspective, we can divide the government and company audit relationship into two categories. (i) uncoordinated: in which one company is audited by one government authority at a time. (ii) coordinated: when many collaborating companies are audited by many government authorities in a coordinated action.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1">Uncoordinated Auditing</head><p>Uncoordinated means that one government authority audits one company at a time, based on direct communication between the company (e.g. trading company) and government authority (e.g. custom). In this category, there are again two subcategories, depending on the audit subject: (i) government audits the company (ii) company audits itself, reporting to the government.</p><p>Audit by the Government: Audit by Government is of detective and corrective nature. Government want to check the status of the organization /company's declarations and trustworthiness. Government authorities or shareholders or investors usually perform this type of audit. They audit the assets, controls, declarations and all the matters related to the company's stability. Audit by the Company: In this case, the company has a rigorous internal auditing system. According to Starreveld et al <ref type="bibr" target="#b25">[27]</ref> organizations need internal control measures, including organizational rules and control activities. These internal controls are in general of a preventive nature, i.e. preventing the occurrence of errors and opportunistic behavior of the organizational agents. The purpose of auditing the internal controls by the company is first of all to implement accountability to owners and to attract investors. Nowadays, they may also be required by partners, e.g. powerful customers who are dependent on the quality of the company's processes. However, the very same measures can be used to implement accountability to the government, thus avoiding duplicated efforts.</p><p>A company/organization provide services to its customers/users with the help of different parallel or stand alone processes. We make an important distinction between operational and control services.</p><p>Operational Service: Each operational service executes a particular activity in the company's primary processes. Operational services consume and produce value objects, so to safeguard value, operational processes need to be controlled. Control Service: Control services implement business control on the operational services. Control services takes place at two levels: control within the organization and external control. Control services involve the creation of management systems, managing the consistency and quality of products coming to/from the company. It also involves the development of programs and processes that operate automatically <ref type="bibr" target="#b32">[34]</ref>.</p><p>Whereas the audit type says who is performing the audit (subject), the service type says what is the primary focus of the audit (object). The following table shows the four possible combinations:</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Audit/Service Operational Control By Company</head><p>Type I Type II By Government Type III Type IV Table <ref type="table">1</ref>. Audit subject/object categorization Type I: Administration in the companies always needs to keep an eye on the status of the company. A focus on operational processes corresponds to traditional transaction-based auditing. Traditionally, this type is not feasible as the government is not willing to accept the risks of abuse and fraud. It is only willing to leave the auditing responsibility to the company when the company is firmly in control (type II). However, with the use of (automated) audit modules (cf. Fig. <ref type="figure" target="#fig_1">1</ref>), the type may become acceptable. The audit module supports a continuous monitoring service of the company's operational services. In this way, it can detect and immune any potential operational issue. The results can be published and made accessible to the government agency. Type II: Companies arrange the audit activity especially auditing the control services for itself to have self-assessment. This so-called system-based control is usually more efficient and effective than the transaction-based type. There are other reasons for choosing this type as well. Companies with international supply chain like to show themselves to be compliant and standardized. The self-assessment can also replace costly governmental controls, as in the case of custom procedures. For this purpose e-customs provides a standard known as Authorized Economic Operator (AEO) certificate <ref type="bibr" target="#b3">[5]</ref>. To get an AEO standard company have to show customs compliance, appropriate recordkeeping standards, financial solvency, and appropriate security and safety standards in place. An audit module audits the company's control services in order to ensure compliance to the AEO standard. This module can use the same architecture as the model in Fig. <ref type="figure" target="#fig_1">1</ref>, where the events being monitored are now control service events (for instance, changing authorizations) rather than operational service events. Type III: When the government audits the operational services then there are two scenarios (i) government physically audits the operations and operational services. This is the traditional way of working, where custom inspectors process clearance request documents per transport and check all or a selection of the containers passing the border. Evidently, this is a labor-intensive process. (ii) Government audits the operational processes by using advanced IT such as the automated scanning, audit tools <ref type="bibr" target="#b31">[33]</ref> and/or process mining techniques such as proposed by Van der Aalst et al <ref type="bibr" target="#b29">[31]</ref>. Type IV: This can be seen as a variant of type II where the company has a rigorous internal control system, but rather than doing a self-assessment, the government remotely monitors and evaluates the control system. This variant may benefit both the company and the customs. Probably, it requires an even higher level of "being in control" then in the case of type II. In this case it is not sufficient that the internal control system is compliant, according to human interpretation, but that this compliance need to be assessed and monitored online. In other words, the internal control system must be highly formalized and automated. The costs that this brings for the company can be compensated by the fact that (manual) self-assessments are no longer needed: the company only needs to provide access to the control services, via some interface. For the customs, it also saves costs of manual processing of AEO reports, and may provide a higher level of security. On the other hand, it requires sophisticated audit tools. It is also important that the interfaces are well-defined and based on standards.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2">Coordinated Auditing</head><p>Growing trade and increased security require new controls. In parallel government would like to reduce the administrative burden. E-customs supports simplified paperless trade procedures, prevents potential security threats and counterfeit tax related frauds and also ensures the interoperability with other e-customs systems within and outside the Europe. The use of SOA in e-customs <ref type="bibr" target="#b23">[25]</ref> helps us to access to the location of goods through its supply chain, the provision of evidence for import/export, the notification through alerts in case of exceptions, for example deviation from the planned trajectory, abnormal conditions for containers and others. With the still growing world-wide trade, no single company can fulfill all needs so it has to collaborate and cooperate with other companies. In this context, coordination emerges as a separate service.</p><p>Coordination Service: Co-ordination services can be defined as services supporting an exchange process (a set of events) for a good or a service <ref type="bibr" target="#b32">[34]</ref>.</p><p>Processes like identification, negotiation, order execution and after-sales take place in a good exchange as well as a service exchange. Within this process, a distinction can be made between core services -the transfer of goods, services or money -and coordination services that support the process and manage the dependencies between activities <ref type="bibr" target="#b2">[4]</ref>.</p><p>Weigand et al <ref type="bibr" target="#b33">[35]</ref>, describe a user-centric service coordination cycle that assumes a consumer who interacts with multiple service providers who in turn offer some real-world service as part of a service bundle. Dependencies between activities arise, among others, from the occurrence of shared resources. For instance, when a consumer wants to use a hotel service and a flight service, a shared resource is the physical person himself, who can be at only one place in a given time. In the case of international trade and custom procedures, a shared resource is the container in question. This creates a need for coordination.</p><p>Next to the co-ordination among the companies in the chain there are multiple government authorities who audit them. Suppose there are n government authorities to audit m companies. In total there will be n.m combination of audits. This will cost lot of effort and time from government authorities. To overcome this issue, the concept of trusted third part may be adopted.  Audit by Third Party: In this scenario there is a third party who is trustworthy for both company as well as Government/ Investor/ Concerned Authorities. Government selects the trusted third party based on some standards and certifications. The third party audits the company, combining the different requirements from different government agencies, and takes a chain perspective rather than focusing on one company only. The type of audit is of detective, corrective and preventive nature. The audit information can be used by the company itself (it has outsourced its auditing so to say). If Government requires audit information then it can extract this online from the third party's interactive interface. Since the third party is external to both the Government and the company, it can manage the coordination of audit activities.</p><p>The concept of third-party can be implemented in several ways. In market economies, it is not realistic to assume that there will be a single third-party.</p><p>Several competing and complementary companies will try to play part of this role. So it is better to talk about a third party network rather than a third party actor. Within such a network there may even be opportunities for a fourth-party actor concept as this also exists in logistics <ref type="bibr" target="#b28">[30]</ref>.</p><p>Assuming a coordinated auditing approach, three coordination types can be distinguished, from minimal to maximal (Table <ref type="table" target="#tab_0">2</ref> Type A: When coordination is not an assigned function. It means N government authorities will audit M number of companies independently. The lack of coordination results in inefficiencies and problems that the company must try to solve. Type B: When there is data and information sharing/coordination between the government authorities, as in the one-stop government concept There may also be chain coordination between the companies, but the two are not integrated.. In the e-customs domain, this type should involve not only data sharing but also coordination of inspection activities. For companies that are currently in type A, this type B is a big improvement. Type C: In this type there is overall coordination between the companies and as well as between the government authorities. This implies that not only companies have a single access point to various government services, but also that the government has a single access point to a logistic chain or business network. In this case, coordination is maximal. This type can only be realized by the support of intermediary third parties. It also requires that the government is willing to retreat from its role of "sole care taker" to the one of Service Provider/Network Manager <ref type="bibr" target="#b11">[13]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Conclusion</head><p>SOA is a basic architecture for integrating global services. Audit in combination with SOA provides a massive potential of innovation. In this paper we have introduced SOAu as a new area of research within the domain of Information Systems. In order to explore the applicability of SOAu we have developed a categorization of auditing approaches based on three dimensions: the audit object, the audit subject and the coordination level. </p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head></head><label></label><figDesc>Fig 1 describes the overall archi-</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. Audit Module</figDesc><graphic coords="7,158.86,285.83,297.65,249.59" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head></head><label></label><figDesc>Fig 2 explains the scenario.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. Coordinated auditing</figDesc><graphic coords="11,180.12,348.36,255.13,90.24" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 2 .</head><label>2</label><figDesc>) Coordination types</figDesc><table><row><cell cols="3">Coordination Type Coordination Level Coordination by</cell></row><row><cell>Type A</cell><cell>Minimal</cell><cell>Company</cell></row><row><cell>Type B</cell><cell>Partial</cell><cell>Government</cell></row><row><cell>Type C</cell><cell>Maximal</cell><cell>Third Party</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head></head><label></label><figDesc>The Single Window concept represents one type (B, III and IV). Different government authorities coordinate among each other and share the company data. When companies and government authorities coordinate with the help of a third party then the concept of ESW comes into play. Type C in combination with any one of type I, II, III, IV provide different possible variants of ESW. This paper introduces the concept of SOAu a basic categorization of application possibilities in e-customs. Evaluation of the viability of these types and the respective IT requirements is an open question for further research that we want to pursue together with the ESW industrial partners.</figDesc><table /></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_0">http://www.dinalog.nl/institute/projects/research-development-projects/ extended-single-window-information-gateway-to-europe/271</note>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgment</head><p>This research is partially supported by the DINALOG (www.dinalog.nl) project "Extended Single Window".</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<title level="m" type="main">Service oriented architecture (SOA) a new paradigm to implement dynamic e-business solutions</title>
		<author>
			<persName><forename type="first">J</forename><surname>Bih</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2006-08">2006. August. 2006</date>
			<publisher>Ubiquity</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Continuous auditing: A literature review</title>
		<author>
			<persName><forename type="first">F</forename><surname>Dal-Ri Murcia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Cruz De Souza</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">Alonso</forename><surname>Borba</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Ykeda</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Information Systems and Technology Management</title>
				<imprint>
			<date type="published" when="2007">2007</date>
			<biblScope unit="volume">1</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<title level="m" type="main">The virtual corporation: Structuring and revitalizing the corporation for the 21st century</title>
		<author>
			<persName><forename type="first">W</forename><surname>Davidow</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Malone</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1993">1993</date>
			<publisher>HarperBusiness</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<title level="m" type="main">European custom code</title>
		<ptr target="http://ec.europa.eu/taxation_customs/customs/policy_issues/customs_security/aeo/index_en.htm" />
		<imprint>
			<date type="published" when="2008-01-11">2008. January 11,2011</date>
			<publisher>European Union</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Auditing business process compliance</title>
		<author>
			<persName><forename type="first">A</forename><surname>Ghose</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Koliadis</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Service-Oriented Computing ICSOC 2007</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">B</forename><surname>Krmer</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">K.-J</forename><surname>Lin</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">P</forename><surname>Narasimhan</surname></persName>
		</editor>
		<meeting><address><addrLine>Berlin / Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2007">2007</date>
			<biblScope unit="volume">4749</biblScope>
			<biblScope unit="page" from="169" to="180" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Seamless electronic data and logistics pipelines shift focus from import declarations to start of commercial transaction</title>
		<author>
			<persName><forename type="first">D</forename><surname>Hesketh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">World Customs Journal</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="27" to="32" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<title level="m" type="main">Service Oriented Architecture (SOA) for Dummies. For Dummies</title>
		<author>
			<persName><forename type="first">J</forename><surname>Hurwitz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Bloor</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Kaufman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Halper</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Stages of growth in e-government: An architectural approach</title>
		<author>
			<persName><forename type="first">M</forename><surname>Janssen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">F</forename><surname>Van Veenstra</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">The electronic journal of e-government</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="page" from="193" to="200" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Gauging e-government: A report on implementing services among american cities</title>
		<author>
			<persName><forename type="first">C</forename><surname>Kaylor</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Deshazo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Van Eck</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Government Information Quarterly</title>
		<imprint>
			<biblScope unit="volume">18</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="293" to="307" />
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Stage models for creating joined-up government: From local to nation-wide integration</title>
		<author>
			<persName><forename type="first">B</forename><surname>Klievink</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Janssen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2008 international conference on Digital government research</title>
				<meeting>the 2008 international conference on Digital government research</meeting>
		<imprint>
			<publisher>Digital Government Society of North America</publisher>
			<date type="published" when="2008">2008</date>
			<biblScope unit="page" from="117" to="123" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Coordinating e-government service delivery</title>
		<author>
			<persName><forename type="first">B</forename><surname>Klievink</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Janssen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 11th Annual International Digital Government Research Conference on Public Administration Online: Challenges and Opportunities</title>
				<meeting>the 11th Annual International Digital Government Research Conference on Public Administration Online: Challenges and Opportunities</meeting>
		<imprint>
			<publisher>Digital Government Society of North America</publisher>
			<date type="published" when="2010">2010</date>
			<biblScope unit="page" from="209" to="216" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Drift or shift? propositions for changing roles of administrations in e-government</title>
		<author>
			<persName><forename type="first">R</forename><surname>Klischewski</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Electronic Government</title>
		<imprint>
			<biblScope unit="page" from="85" to="96" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Continuous auditing in erp system environments: The current state and future directions</title>
		<author>
			<persName><forename type="first">J</forename><surname>Kuhn</surname><genName>Jr</genName></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Sutton</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Information Systems</title>
		<imprint>
			<biblScope unit="volume">24</biblScope>
			<biblScope unit="page">91</biblScope>
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Developing fully functional e-government: A four stage model</title>
		<author>
			<persName><forename type="first">K</forename><surname>Layne</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Lee</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Government information quarterly</title>
		<imprint>
			<biblScope unit="volume">18</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="122" to="136" />
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">The REA accounting model: A generalized framework for accounting systems in a shared data environment</title>
		<author>
			<persName><forename type="first">W</forename><surname>Mccarthy</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">The Accounting Review</title>
		<imprint>
			<biblScope unit="volume">57</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="554" to="578" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">The evolution of e-government among municipalities: Rhetoric or reality?</title>
		<author>
			<persName><forename type="first">M</forename><surname>Moon</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Public administration review</title>
		<imprint>
			<biblScope unit="volume">62</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="424" to="433" />
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<monogr>
		<ptr target="http://www.oasis-open.org" />
		<title level="m">OASIS SOA reference model</title>
				<imprint>
			<date type="published" when="2011-03-20">2011. March 20,2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Service-oriented computing: State of the art and research challenges</title>
		<author>
			<persName><forename type="first">M</forename><surname>Papazoglou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Traverso</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Dustdar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Leymann</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computer</title>
		<imprint>
			<biblScope unit="volume">40</biblScope>
			<biblScope unit="issue">11</biblScope>
			<biblScope unit="page" from="38" to="45" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Service oriented architectures: approaches, technologies and research issues</title>
		<author>
			<persName><forename type="first">M</forename><surname>Papazoglou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Van Den</surname></persName>
		</author>
		<author>
			<persName><surname>Heuvel</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">The VLDB Journal</title>
		<imprint>
			<biblScope unit="volume">16</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="389" to="415" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Extending the service-oriented architecture</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">P</forename><surname>Papazoglou</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Business integration journal</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="page" from="18" to="21" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Service-oriented design and development methodology</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">P</forename><surname>Papazoglou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W.-J</forename><forename type="middle">V D</forename><surname>Heuvel</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Int. J. Web Eng. Technol</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="412" to="442" />
			<date type="published" when="2006-07">July 2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Towards online auditing.the database environment</title>
		<author>
			<persName><forename type="first">S</forename><surname>Popa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Ionescu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">II International Seminar on IT Audit</title>
				<meeting><address><addrLine>Nanjing,China</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<monogr>
		<title level="m" type="main">Cloud computing and SOA</title>
		<author>
			<persName><forename type="first">G</forename><surname>Raines</surname></persName>
		</author>
		<ptr target="http://www.mitre.org/work/tech_papers/tech_papers_09/09_0743/09_0743.pdf" />
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Towards ubiquitous e-custom services</title>
		<author>
			<persName><forename type="first">L</forename><surname>Razmerita</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Bjorn-Andersen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence</title>
				<meeting>the IEEE/WIC/ACM International Conference on Web Intelligence<address><addrLine>WI</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE Computer Society</publisher>
			<date type="published" when="2007">2007. 2007</date>
			<biblScope unit="page" from="833" to="837" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">A two-stage model of e-government growth: Theories and empirical evidence for US cities</title>
		<author>
			<persName><forename type="first">C</forename><surname>Reddick</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Government Information Quarterly</title>
		<imprint>
			<biblScope unit="volume">21</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="51" to="64" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<monogr>
		<author>
			<persName><forename type="first">R</forename><surname>Starreveld</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>De Mare</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Joels</surname></persName>
		</author>
		<title level="m">Bestuurlijke informatieverzorging: Algemene grondslagen</title>
				<imprint>
			<publisher>Samsom</publisher>
			<date type="published" when="1985">1985</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">Becoming cyberactive: State and local governments on the world wide web</title>
		<author>
			<persName><forename type="first">G</forename><surname>Stowers</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Government Information Quarterly</title>
		<imprint>
			<biblScope unit="volume">16</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="111" to="127" />
			<date type="published" when="1999">1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<monogr>
		<ptr target="https://www.opengroup.org/projects/soa/" />
		<title level="m">SOA work group member site</title>
				<imprint>
			<date type="published" when="2011-03-20">2011. March 20,2011</date>
		</imprint>
	</monogr>
	<note>The Open Group</note>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">A framework for evaluating third-party logistics</title>
		<author>
			<persName><forename type="first">G</forename><surname>Vaidyanathan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Commun. ACM</title>
		<imprint>
			<biblScope unit="volume">48</biblScope>
			<biblScope unit="page" from="89" to="94" />
			<date type="published" when="2005-01">January 2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<analytic>
		<title level="a" type="main">Auditing 2.0: Using process mining to support tomorrow&apos;s auditor</title>
		<author>
			<persName><forename type="first">W</forename><surname>Van Aalst</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Van Hee</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Van Werf</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Verdonk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computer</title>
		<imprint>
			<biblScope unit="volume">43</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="90" to="93" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<analytic>
		<title level="a" type="main">Conceptual model for online auditing</title>
		<author>
			<persName><forename type="first">W</forename><surname>Van Der Aalst</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Van Hee</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Van Der Werf</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kumar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Verdonk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Decision Support Systems</title>
		<imprint>
			<biblScope unit="volume">50</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="636" to="647" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b31">
	<monogr>
		<title level="m" type="main">Supporting customs controls by means of serviceoriented auditing</title>
		<author>
			<persName><forename type="first">H</forename><surname>Weigand</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">A</forename><surname>Bukhsh</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2011">2011</date>
		</imprint>
		<respStmt>
			<orgName>Department of Information Management, University of Tilburg</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">manuscript</note>
</biblStruct>

<biblStruct xml:id="b32">
	<analytic>
		<title level="a" type="main">Management service -a framework for design</title>
		<author>
			<persName><forename type="first">H</forename><surname>Weigand</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Johannesson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Andersson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">J</forename><surname>Arachchige</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Bergholtz</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceeding of 23 rd International Conference on Advanced Information Systems Engineering published in Lecture Notes in Computer Science</title>
				<meeting>eeding of 23 rd International Conference on Advanced Information Systems Engineering published in Lecture Notes in Computer Science</meeting>
		<imprint>
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
	<note>accepted</note>
</biblStruct>

<biblStruct xml:id="b33">
	<analytic>
		<title level="a" type="main">Closing the user-centric service coordination cycle by means of coordination services</title>
		<author>
			<persName><forename type="first">H</forename><surname>Weigand</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Johannesson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Andersson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Bergholtz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Arachchige</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Lecture Notes in Business Information Processing</title>
		<imprint>
			<biblScope unit="volume">72</biblScope>
			<biblScope unit="page" from="267" to="282" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b34">
	<monogr>
		<author>
			<persName><forename type="first">D</forename></persName>
		</author>
		<title level="m">West and Taubman Center for Public Policy. Urban e-government: An assessment of city government websites</title>
				<imprint>
			<date type="published" when="2001">2001</date>
		</imprint>
		<respStmt>
			<orgName>Taubman Center for Public Policy, Brown University</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b35">
	<analytic>
		<title level="a" type="main">International audit techniques traditional versus progressive approach</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">W</forename><surname>Zarkasyi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Jurnal Ekonomi dan Bisnis Terapan</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
