This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
1. Introduction
With the advent of the era of big data, massive and diverse data pushes the difficulty of audit work to a higher level. How to combine big data with audit and gradually transform traditional audit functions is the focus of this paper.
Big data technology makes up for the insufficiency of sampling audit, can analyze and process all data, and change the way of processing structured data. Moreover, it is no longer the inductive analysis of the abstracted information, but the direct analysis of the original data. However, this also creates a new problem, that is, a large part of the super-large-capacity data is meaningless or even erroneous, which results in the property of low value density of big data. For example, valuable footage in hours of surveillance footage may only be two or three seconds, but those few seconds are the crux of the problem. At the same time, valuable big data is like oil and gold, which are rare in quantity but have extremely high commercial value after being mined.
Sufficiency puts forward higher requirements for the quantity of audit evidence, but in the traditional audit process, some audit evidences are difficult to obtain, sufficiency cannot be satisfied, and the correctness of audit results cannot be guaranteed. In the era of big data, with the development of information technology, it has become easy to obtain audit evidence, and the problem of difficulty in obtaining sufficient evidence has been solved.
The relevance of audit evidence in the era of big data is higher, which is embodied in the following three aspects. First, audit evidence can be obtained in time, which reduces the time cost and improves the lag of manual information acquisition [1]. The second is to improve the audit confirmation ability, and use big data technology to weave an interlocking audit evidence network to check and review the internal and external non-financial information of the enterprise, which can quickly and accurately find problematic links. This method overcomes the defects of untimely acquisition of manual information, low accuracy and weak objectivity, and the audit evidence obtained by this method has a higher confirmation value [2]. Third, the audit data has the function of prediction, and the data mining technology can predict the future information by analyzing the relevant data and establishing the corresponding model. For example, the regression analysis method is one of the most widely used methods. The prediction function not only enables auditors to formulate audit plans in advance and improve audit efficiency, but more importantly, it can turn post-event audits into pre-event audits, and pay attention to the key points, difficulties, and easy omissions of the audit in advance [3].
Objectivity means that the audit evidence cannot be mixed with personal subjective assumptions. For example, verbal evidence may be highly subjective, and it needs to be filtered and screened reasonably. Traditional forensics methods mainly rely on the information provided by enterprises, in order to pursue their own interests, enterprises may provide false information. However, in the era of big data, auditors can obtain third-party information through various data collection devices, which have higher objectivity. Finally, authenticity and integrity mean that audit evidence must be true and complete. Audit evidence in the era of big data is readily available, but its authenticity cannot be fully guaranteed, and data may be wrong or intentionally tampered with when entering the information system. It can be imagined how difficult it is to identify misinformation in the mass of information. Therefore, the true integrity of audit evidence in the era of big data has declined to a certain extent.
This paper discusses how the outlier algorithm is applied to the acquisition of audit evidence and the application scenarios in the audit system, improves the data processing effect of the audit process, and improves the reliability of the audit process.
The main contribution of this paper: the association rules and outlier algorithms are introduced into the audit and supervision information system to obtain audit evidence. When using the association rule algorithm, the algorithm is further improved to improve the time efficiency and space efficiency of the algorithm. When using the outlier algorithm, the cell-based outlier algorithm is optimized, and the dynamic threshold method is used to improve the accuracy of the edge outlier detection.
The organizational structure of this paper is as follows: the introduction part points out the necessity and feasibility of applying data mining technology to the research on the acquisition of audit evidence; the second part summarizes the relevant research, explores the starring research content of the existing research, and introduces the content of this paper. In the third part, the algorithm is improved. Aiming at the disadvantage that the cell-based outlier detection algorithm is not friendly to edge “point” detection, the improvement of the algorithm is proposed. Then, after preprocessing the audit data, the improved unit-based outlier detection algorithm is used in the study of audit evidence acquisition based on outlier algorithm, and the system structure of this paper is constructed, and the algorithm and model are carried out through experimental research. Finally, the research content of this paper is summarized.
2. Related Work
Literature [4] proposes the term CAATTs (Computer-Assisted Audit Tools and Techniques). Literature [5] believes that computer-aided auditing techniques refer to the use of any technology in the process of helping to complete the audit. The CNAO with Computer-aided auditing technology is defined as “audit institutions and auditors use computers as an auxiliary audit tool to audit the finances, financial revenues and expenditures of the audited units and their computer application systems. Help auditors collect audit evidence, improve audit efficiency, and reduce auditing.” The specific process is to use audit software to collect electronic data according to the needs of audit tasks, and then preprocess these electronic data and complete data analysis to obtain audit evidence. Audit software mainly includes general data analysis software and professional audit software. The software generally has data collection and analysis functions. Through data collection, the electronic data of the audited unit is imported into the database of the audit software, and audit clues are found by data sampling, statistical generalization, data query, abnormal detection, etc., and finally submitted for audit. The department collects evidence to form audit conclusions [6]. Compared with manual audit, computer-aided audit can effectively expand audit scope and improve audit efficiency. However, it also has certain limitations. For example, it is effective for explicit violations; for more complex and concealed activities, electronic data analysis is relatively inefficient or even ineffective; there is no way to deal with the information islands existing in the audit, and there is a lack of consideration for the association of independent data; electronic data collection is time-consuming and labor-intensive, and it is impossible to conduct cross-regional and cross-industry audits [7].
Literature [8] believes that big data will become a powerful supplement to traditional audit evidence collection methods because of its adequacy, reliability, and relevance. Literature [9] analyzes the ability of big data and current continuous audit data analysis in data consistency (consistency), integrity (integrity), aggregation (aggregation), identification (identification), confidentiality (confidentiality), and other aspects of the gap. Literature [10] believes that modern audit management needs to integrate big data and complex business analysis methods. Literature [11] discusses the challenges of big data to computer auditing, and looks forward to how to use big data to promote the development of computer auditing. Literature [12] discusses the audit thinking in the context of big data suggestions on the development of the audit model, audit technology methods, audit personnel training, and management model. Literature [13] analyzes the impact of the big data environment on the data audit model and the feasibility of improvement, and analyzes the logical process, network architecture, and application architecture from the perspective of the perfect design, and application index design of the data audit model are carried out from an equal perspective.
Literature [14] proposed the big data audit work model of “centralized analysis, discovery of doubts, decentralized verification, and systematic research,” as well as “the vertical relationship between the central government and the provinces and cities, the horizontal relationship between the first- and second-level budget units, the financial data, the data association of enterprises, the association of finance with other multi-department and multi-industry data, the association of financial data with business data, and macroeconomic data” five analysis requirements, and have been used many times in enterprise audit, financial audit, resource and environmental audit, Cloud computing, intelligent mining, social networking, natural language understanding, visualization, word cloud analysis and geographic information technology and other big data analysis technologies. The US Audit Office has adopted a variety of new technologies for unstructured data analysis and web data mining. In a specific audit practice, potential fraud was detected by correlating the list of people who died in society with the list of people receiving federal subsidies [15].
3. Our Improved Association Algorithm
This paper introduces the cell-based outlier detection algorithm. However, there is a problem with this algorithm, that is, the threshold M is fixed. However, it is not appropriate to use the same threshold M for boundary cells and non-boundary cells.
For non-boundary cell C, the number of cells in the first layer is
To solve this problem, this paper proposes a dynamic threshold method. The core idea is to use different thresholds M according to the different positions of cell C. We assume the interval value when cell C is non-boundary is
When it is a non-boundary case,
In the case of Figure 1(a), cell C is located at the top corner of the boundary, and the number of cells in the first layer is 3 and the number of cells in the second layer is 12. According to formula (1), we can get [17]:
[figure(s) omitted; refer to PDF]
In the case of Figure 1(b), cell C is located at the non-vertical corner of the boundary and not close to the edge, and the number of cells in the first layer is 8 and the number of cells in the second layer is 26. According to formula (1), we can get:
The above discussion is for 2D datasets, but the extension to cube datasets is still valid. The following extends formula (1) to multi-dimensional, and we assume that the dimension of the dataset is
After improving the dynamic threshold of the original algorithm, compared with the original algorithm, there is only one more calculation of
Regarding the calculation of the distance, this topic adopts the Euclidean distance for calculation. For the two objects
Among them,
In the cell-based outlier detection algorithm, the “area” of the data space is the product of the “side lengths” of each dimension.
We assume that there are n points in the
For the determination of the distance threshold r, the common practice of distance-based outlier detection methods is to calculate the distance between all objects in the dataset, and then take the average of all distances as the distance threshold r. It can be seen that the computational complexity of this method is very large.
Therefore, the determination of the r value here does not adopt this traditional method, but adopts a new calculation method. Taking a two-dimensional plane as an example, an ideal two-dimensional plane graph with no vertical points at all should be a graph with all points evenly distributed. If this two-dimensional plan is divided into many small squares of the same size, then each point should occupy a small square. If there are some points that are close to each other, there must be two or more points in a square, and there must be no points in some squares. At this point, the points in the 2D plan form clusters and outliers. Figure 2(a) shows a uniform distribution with no outliers, while Figure 2(b) shows clusters and outliers.
[figure(s) omitted; refer to PDF]
We assume that the side length of the small square in the figure is
Similarly, it can be extended to multi-dimensional space. We assume that the dimension is
In the cell-based outlier detection algorithm, the data space is divided into multi-dimensional grids, and the calculation method of grid division is given below.
The side length of each small hypercube divided is
We assume that there are n points in the
For the i-th dimension, it is necessary to find out the maximum value
It is worth noting that the result of
Next, we need to assign a total of n points
It is worth noting that the result of
The algorithm counts the total number of objects in the first-level unit of each unit, and the maximum value is recorded as
Among them,
When
The improved cell-based outlier detection Algorithm 1 flow is described as follows:
Algorithm 1: Cell-based outlier detection algorithm flow.
(1) The algorithm inputs all data objects, and calculates its distance threshold r according to formula (8).
(2) The algorithm divides the cells according to formula (9), records the number of objects in each cell as count, and assigns the initial value count = 0.
(3) The algorithm assigns each object to the corresponding cell according to formula (10), and makes the count++ of the corresponding cell.
(4) The algorithm determines the threshold
(5) The algorithm repeats steps (6)–(18) for each cell
(6) The algorithm calculates the dynamic threshold
(7) If
(8)
(9)
(10) Else: The algorithm repeats steps (11) –(17) for each object P in
(11) We assume that the number of objects in the r neighborhood of object P is
(12) The algorithm repeats steps (13) –(15) for each object Q of the second level unit of
(13) The algorithm calculates the distance
(14)
(15) The algorithm goes to step (12).
(16)
(17) The algorithm goes to step (10).
(18) The algorithm goes to step (5).
(19) The algorithm removes all objects marked as Red as all outliers.
In order to test the actual effect of the improved algorithm, a comparative experiment is carried out on the outlier detection algorithm based on the unit before and after the improvement.
The specific experimental method is to use MATLAB 7.11.0 software to randomly generate coordinate points on a two-dimensional plane. The outlier detection algorithm based on the unit before the improvement and the outlier detection algorithm based on the unit after the improvement are, respectively, used to detect the outliers, and the detection results are compared and analyzed.
The experiment is shown in Figure 3. The size of the two-dimensional plane is
[figure(s) omitted; refer to PDF]
The isolated points detected by the algorithm before the improvement are shown in Figure 4, and the isolated points detected by the improved algorithm are shown in Figure 5. Among them, the red marked points represent the detected outliers.
[figure(s) omitted; refer to PDF]
By comparing Figures 4 and 5, it can be found that the outliers detected in the non-boundary situation are completely consistent before and after the algorithm is improved. However, the detection results in the boundary case are quite different. After analyzing the detected outliers, it is found that the algorithm before the improvement misjudged many non-outliers on the boundary as outliers. However, the improved algorithm effectively avoids this situation because of the dynamic threshold method.
The experimental results show that our improvement of the algorithm is reasonable, and the dynamic threshold method effectively solves the problem that the original algorithm easily misjudges the boundary points as outliers.
4. Performance Analysis
Big data auditing is a new auditing method with the development of big data technology. Its contents include electronic data auditing in big data environment (how to use big data technology to audit electronic data and how to audit electronic data in big data environment) and auditing of information systems in big data environment. Among them, the electronic data auditing in the big data environment is a research hotspot, and the overall block diagram of the big data auditing technology based on the improved association algorithm is shown in Figure 6.
[figure(s) omitted; refer to PDF]
Under big data auditing, it is necessary to coordinate the relationship between data collection and analysis and traditional auditing processes. At the same time, it is necessary to optimize the audit workflow to adapt to the big data audit environment, so as to standardize the audit business behavior, improve the audit control level, and realize the improvement of the audit efficiency. The big data internal control audit process framework is shown in Figure 7.
[figure(s) omitted; refer to PDF]
After obtaining the above improved association algorithm and big data internal control audit process framework system, the effect of the system is verified, the audit data mining effect and audit effect are counted, and the results shown in Tables 1 and 2 are obtained.
Table 1
Audit data mining effect.
Number | Audit mining | Number | Audit mining | Number | Audit mining |
1 | 88.58 | 23 | 85.99 | 44 | 91.16 |
2 | 90.26 | 24 | 84.85 | 45 | 85.61 |
3 | 91.48 | 25 | 91.00 | 46 | 86.60 |
4 | 90.35 | 26 | 84.47 | 47 | 91.63 |
5 | 84.10 | 27 | 91.84 | 48 | 89.08 |
6 | 85.03 | 28 | 88.77 | 49 | 88.16 |
7 | 87.67 | 29 | 90.25 | 50 | 87.07 |
8 | 85.30 | 30 | 87.86 | 51 | 89.86 |
9 | 87.71 | 31 | 86.46 | 52 | 90.76 |
10 | 87.21 | 32 | 87.15 | 53 | 87.43 |
11 | 87.47 | 33 | 87.58 | 54 | 86.42 |
12 | 90.46 | 34 | 88.06 | 55 | 90.89 |
13 | 90.91 | 35 | 91.58 | 56 | 90.49 |
14 | 89.03 | 36 | 84.36 | 57 | 88.54 |
15 | 91.84 | 37 | 88.91 | 58 | 90.76 |
16 | 89.79 | 38 | 88.58 | 59 | 89.49 |
17 | 84.17 | 39 | 85.53 | 60 | 90.74 |
18 | 86.15 | 40 | 84.16 | 61 | 86.69 |
19 | 90.07 | 41 | 90.64 | 62 | 86.56 |
20 | 89.55 | 42 | 86.94 | 63 | 89.19 |
21 | 90.77 | 43 | 88.27 | 64 | 86.35 |
22 | 89.80 |
Table 2
Auditing effect of financial data.
Number | Audit effect | Number | Audit effect | Number | Audit effect |
1 | 86.39 | 23 | 88.03 | 44 | 79.73 |
2 | 78.69 | 24 | 79.21 | 45 | 82.17 |
3 | 87.20 | 25 | 82.47 | 46 | 88.53 |
4 | 85.51 | 26 | 88.12 | 47 | 83.83 |
5 | 83.13 | 27 | 84.65 | 48 | 79.65 |
6 | 79.39 | 28 | 87.66 | 49 | 79.67 |
7 | 80.42 | 29 | 89.80 | 50 | 88.28 |
8 | 87.66 | 30 | 83.94 | 51 | 87.91 |
9 | 79.85 | 31 | 83.08 | 52 | 84.26 |
10 | 88.38 | 32 | 85.74 | 53 | 84.64 |
11 | 79.55 | 33 | 79.26 | 54 | 77.79 |
12 | 80.88 | 34 | 89.76 | 55 | 78.54 |
13 | 82.56 | 35 | 77.16 | 56 | 85.47 |
14 | 84.61 | 36 | 86.28 | 57 | 85.98 |
15 | 84.10 | 37 | 84.32 | 58 | 79.12 |
16 | 81.51 | 38 | 88.62 | 59 | 78.50 |
17 | 78.63 | 39 | 78.08 | 60 | 81.55 |
18 | 83.80 | 40 | 85.80 | 61 | 78.18 |
19 | 81.08 | 41 | 77.92 | 62 | 84.53 |
20 | 81.93 | 42 | 80.73 | 63 | 81.39 |
21 | 81.50 | 43 | 87.61 | 64 | 87.34 |
22 | 89.41 |
It can be seen from the above research that the audit data mining system based on the improved association algorithm proposed in this paper has a good effect in the audit of accounting and financial data.
5. Conclusion
Big data also has a profound impact on the reliability of audit evidence, and the reliability of audit evidence needs to be considered from three aspects: verifiability, objectivity, and integrity. Audit evidence can be cross-verified with each other to see if it actually exists. The traditional verification method of audit evidence is relatively simple, and it is often through the traceability of business processes to check whether the data matches, and then to find forged or wrong audit evidence. However, with the support of big data technology, the singleness of audit evidence has evolved into diversity, and auditors can obtain more audit evidence from channels outside the financial account and outside the enterprise, which enhances its verifiability. This paper combines the improved association algorithm to construct the audit data mining system to improve the data processing effect of the audit process. The research shows that the audit data mining system based on the improved association algorithm proposed in this paper has a good effect in accounting and financial data auditing.
At present, this paper only applies the association algorithm and the outlier algorithm to the limited scenarios of the system. In the future, more scenarios that can use the above two algorithms can be explored and implemented in the system. The current amount of data is not “very” huge, so in the system, a single machine is used to implement the association rule algorithm and the outlier algorithm. In the future, it is necessary to consider how to implement the algorithm in this paper when the amount of data is very large.
Acknowledgments
This work was supported by Hohai University.
[1] B. L. Handoko, A. N. Mulyawan, A. N. Mulyawan, J. Tanuwijaya, F. Tanciady, "Big data in auditing for the future of data driven fraud detection," International Journal of Innovative Technology and Exploring Engineering, vol. 9 no. 3, pp. 2902-2907, DOI: 10.35940/ijitee.b7568.019320, 2020.
[2] Z. Rezaee, A. Dorestani, S. Aliabadi, "Application of time series analyses in big data: practical, research, and education implications," Journal of Emerging Technologies in Accounting, vol. 15 no. 1, pp. 183-197, DOI: 10.2308/jeta-51967, 2018.
[3] D. Chessell, O. Neguriţă, "Smart industrial value creation, cyber-physical production networks, and real-time big data analytics in sustainable Internet of Things-based manufacturing systems," Journal of Self-Governance and Management Economics, vol. 8 no. 4, pp. 49-58, 2020.
[4] B. Abdualgalil, S. Abraham, "Efficient machine learning algorithms for knowledge discovery in big data: a literature review," Database, vol. 29 no. 5, pp. 3880-3889, 2020.
[5] O. Throne, G. Lăzăroiu, "Internet of Things-enabled sustainability, industrial big data analytics, and deep learning-assisted smart process planning in cyber-physical manufacturing systems," Economics, Management, and Financial Markets, vol. 15 no. 4, pp. 49-58, DOI: 10.22381/EMFM15420205, 2020.
[6] E. Nica, C. I. Stan, A. G. Luțan, R. Oa, "Internet of things-based real-time production logistics, sustainable industrial value creation, and artificial intelligence-driven big data analytics in cyber-physical smart manufacturing systems," Economics, Management, and Financial Markets, vol. 16 no. 1, pp. 52-63, DOI: 10.22381/emfm16120215, 2021.
[7] D. B. L. Shallal Almutairi, "Impact OF COVID19 ON accounting profession from the perspective OF a sample OF head OF accounting departments within KUWAITI manufacturing sector," Psychology and Education Journal, vol. 58 no. 2, pp. 4758-4768, DOI: 10.17762/pae.v58i2.2867, 2021.
[8] V. Q. Thong, "Factors defining the effectiveness of integrated accounting information system in ERP environment–Evidence from Vietnam’s enterprises," Economics And Business Administration, vol. 7 no. 2, pp. 96-110, DOI: 10.46223/HCMCOUJS.econ.en, 2017.
[9] J. R. A. Q. Al Natour, "The impact of information technology on the quality of accounting information (SFAC NO 8, 2010)," Turkish Journal of Computer and Mathematics Education (TURCOMAT), vol. 12 no. 13, pp. 885-903, 2021.
[10] A. P. Aaron, M. L. Kohlstrand, L. V. Welborn, S. T. Curvey, "Maintaining medical record confidentiality and client privacy in the era of big data: ethical and legal responsibilities," Journal of the American Veterinary Medical Association, vol. 255 no. 3, pp. 282-288, DOI: 10.2460/javma.255.3.282, 2019.
[11] B. J. Ali, M. S. Oudat, "Accounting information system And financial sustainability OF commercial and islamic banks: a review OF the literature," Journal of Management Information and Decision Sciences, vol. 24 no. 5, 2021.
[12] H. Lu, C. B. Sivaparthipan, A. Antonidoss, "Improvement of association algorithm and its application in audit data mining," Journal of Interconnection Networks, vol. 8,DOI: 10.1142/s0219265921440023, 2021.
[13] S. Antony Sibi, S. Antony Lucia Merin, "An investigation on accounting information system, Zambia," Shanlax International Journal of Management, vol. 8 no. 2, pp. 13-20, DOI: 10.34293/management.v8i2.3364, 2020.
[14] L. Loku, B. Fetaji, A. Krsteski, "Automated medical data analyses of diseases using big data," Knowledge International Journal, vol. 28 no. 5, pp. 1719-1724, DOI: 10.35120/kij28051719l, 2018.
[15] M. Wu, L. Tan, X. Naixue, "A structure fidelity approach for big data collection in wireless sensor networks," Sensors, vol. 15 no. 1, pp. 248-273, DOI: 10.3390/s150100248, 2015.
[16] S. Huang, A. Liu, S. Zhang, T. Wang, N. N. Xiong, "BD-VTE: a novel baseline data based verifiable trust evaluation scheme for smart network systems," IEEE Transactions on Network Science and Engineering, vol. 8 no. 3, pp. 2087-2105, DOI: 10.1109/TNSE.2020.3014455, 2020.
[17] H. Li, J. Liu, W. K. Feng, Z. Yang, R. W. Liu, N. Xiong, "Spatio-temporal vessel trajectory clustering based on data mapping and density," IEEE Access, vol. 6, pp. 58939-58954, DOI: 10.1109/access.2018.2866364, 2018.
[18] K. Gao, F. Han, D. Pingping, N. Xiong, R. Du, "Connected vehicle as a mobile sensor for real time queue length at signalized intersections," Sensors, vol. 19 no. 9,DOI: 10.3390/s19092059, 2019.
[19] P. Yang, J. Ren, "Data security and privacy protection for cloud storage: a survey," IEEE Access, vol. 8, pp. 131723-131740, DOI: 10.1109/access.2020.3009876, 2020.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Copyright © 2022 Putianyi Qiu. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0/
Abstract
Audit evidence is the proof material on which the auditors issue audit opinions and make relevant audit conclusions, and audit evidence in the era of big data presents new characteristics in terms of adequacy, relevance, and reliability. This paper combines the improved association algorithm to construct the audit data mining system to improve the data processing effect of the audit process. Moreover, this paper proposes a new dynamic threshold method, gives the calculation method of some important parameters in the algorithm, and presents the improved cell-based association algorithm flow. In addition, this paper discusses how the outlier algorithm is applied to the acquisition of audit evidence and the application scenarios in the audit system. The experimental research results show that the audit data mining system based on the improved association algorithm proposed in this paper has a good effect in the audit of accounting and financial data.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer