“…The architecture consists of eight elements: "(1) data-capture layer, (2) data-filtering layer, (3) relational storage, (4) measurementstandards layer, (5) inference engine, (6) analytic layer, (7) alarms and alerting layer, and (8) reporting platform" (Vasarhelyi et al 2004, p. 12). Related to this architecture, Kuhn and Sutton (2006) proposed using the architecture specifically for detecting financial statement fraud and discussed how a continuous analytical monitoring model of certain "key-event-transactions" can be used to alert auditors of potential management fraud, while Murthy and Groomer (2004) proposed a new Web Services based monitoring and control layer architecture for business process monitoring that would facilitate and standardize the communication between assurance providers and clients. While not monitoring transaction level data or internal controls for exceptions, nor monitoring data in real-time, Nigrini and Johnson (2008) report on an implementation where restaurants are scored on ten key variables using data from monthly sales reports to help internal auditors decide which restaurants to investigate.…”