/
Presented to: & Presented to: &

Presented to: & - PowerPoint Presentation

kittie-lecroy
kittie-lecroy . @kittie-lecroy
Follow
346 views
Uploaded On 2019-12-17

Presented to: & - PPT Presentation

Presented to amp October 4 2013 A Case Study in Continuous Controls Monitoring Course goal s amp objectives To guide participants through the terminology concepts and value proposition for deploying Continuous ID: 770655

dup prior ccm null prior dup null ccm addr vendor def val isnull invoice dbo data duplicate case amp

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "Presented to: &" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Presented to:&October 4, 2013 A Case Study in Continuous Controls Monitoring

Course goals & objectives To guide participants through the terminology, concepts and value proposition for deploying Continuous Controls Monitoring (CCM). Review of what CCM is Benefits of CCMRequired ComponentsDiscuss the Emory Case Study Tools to leverage The Approach and Best Practices Discuss Emory’s ROI

About the PresentersMark Hafitz , Director of Information Technology Special Projects, Emory UniversityMark has worked for Emory University for over 20 years. His career at Emory started in the Information Technology Division working as a Programmer/Analyst supporting financial applications.  Several years later he began working in the Human Resources Division as the Assistant Director, Information Systems. He managed the daily operations of the Human Resources Information Systems area and oversaw the development and maintenance of all Human Resources systems.  For the last 15 years he has worked in the Finance Division managing and overseeing the completion of the division wide financial systems projects as the Director of Financial Projects . Prior to Emory, Mark spent several years as a Programmer/Analyst working with the Information Systems group at Kimberly-Clark Corporation. Mark received his Master of Business Information Systems degree from Georgia State University, and a Bachelor of Arts in English Literature from Emory University. Scott Stevenson, CIA CPA, Interim Chief Audit Officer, Emory University Scott is responsible for overseeing the University administrative compliance and continuous auditing programs and special projects, which include conducting investigations and leading the anti-fraud and financial attestation programs.  Before joining Emory in 2005, Scott served as a Director at Bon Secours Health System and a consultant with Ernst & Young and PricewaterhouseCoopers.  He spent a year in Savannah as the Chief Audit Officer for the Memorial Health System.  A member of the Institute of Internal Auditors, and the HealthCare Financial Management Association, Scott has over 25 years of accounting and audit experience.  He is a Certified Public Accountant (CPA), a Certified Internal Auditor (CIA), and holds a BS from Wake Forest University and an MBA from Averett University . Wylie Roberts, CPA, Senior Manager, Business Advisory Services - Solomon Edwards Wylie Roberts has extensive finance, accounting, and technology experience, including project management, financial reporting, system implementations, internal controls, business process improvement, and hands-on development of CPM applications. Wylie’s recent work for clients has included building interactive web-based Business Intelligence Reporting platforms, technical lead consultant developing Continuous Controls Monitoring software, acting as an Interim CFO, helping a company convert legacy data to a new payroll systems, and helping a company centralize and improve its AP function. Wylie began his career and earned his CPA license with KPMG. He is a recognized authority on GRC and recently authored an article on IT related fraud risk that was published in Accounting Today.

What is CCMContinuous Controls Monitoring (CCM) is an ongoing systematic practice of observing and checking, for reasonable assurance, that Information Technology Systems (hardware and/or software) operate as designed. These supervisory practices, against IT systems, have a basis for maintaining data validity, reliability, and integrity. Several areas where modern organizations depend on IT systems to operate continuously, accurately and effectively:The reporting of organization finances. E-Commerce and Electronic Funds Transfer.Network and Computing Platform Security.Medical, Criminal, or Federal Data Records Management and Retention.Public Telecommunications Voice and Data Networks National Energy Grids and Utilities . -Wikipedia 4

Benefits of CCMProactive Mitigation -- Results can be acted on rapidly, sometimes before transaction cycle completesGoes beyond just “reporting” to provide an actionable control frameworkCutting costs, prevents fraud, stops broken processes– Ex: T&E expense submissionsAutomate manual tasks – Ex: Reconciliations, IA testing procedures, ReviewsEnhance Revenue – Ex: sales or source documents that trigger revenue recognition missing Creates a “virtuous Cycle” – Audit area’s remain under “testing” from that point forward, removing the need to repeat, freeing up time for testing in novel areas – Ex: Periodic testing of Access Controls: never need to assign resources to do this again once you set this up. Creates an environment that deters attempts at defalcations 5

6 Examples T&E: Submissions related to terminated or non-existent employees Duplicate Submissions (of same expense item) on different dates Same Employee on multiple meal submissions for same date (including on perdiem as well as named as attendee on itemized meal expense) Trend analysis that indicates abuse of receipt requirement thresholds or other unusual activity (Recurring unusual or just below limit submissions) Itemized gas expense on or about same period that mileage expense is claimed Exceeding reasonable limit (examples: over $100 per person meal expense, or more than one standard deviation above the average for a given city for hotel expense) Timing suspicious (example: occurs on date that employee reported vacation or sick time on timesheet; requires access to payroll data) Unapproved merchant or type of expense (retail stores, liquor stores, strip clubs, etc.)

7 Examples (Cont.) Reduce GRC Costs/Audit FeesCatch systems user permissions that violate segregation of duties principles (Automated testing of SOD/Access Controls) Catch Journal Entries with improper or missing approval (based on amount, account, center, or user) Catch Journal Entries made to unusual accounts for a given center/user (statistical anomalies) Catch Fraud Notification of Vendor File tampering (Ex: change and change-back fraud attempt) Vendors who’s address is similar to an employee’s Notify of entries with unusual amounts or time of day

8 Examples (Cont.) Control and Reconciliation Automation: Find duplicate or missing checks by bank account Produce automated notification of events requiring review or authorization (changes to salary rates, payments over certain limits, etc.) Catch terminated or other non-employees with systems access or on payroll Stop Revenue Leakage : Notify of missing Proof of Delivery

9 Examples of What CCM Does (Cont.) Reduce Operational CostsCatch PO’s where cost exceeds retail price (or where margin would be below a set threshold) Identify products with Zero quantities or prices Notify of duplicate items added to inventory master or purchasing master Transactions out of the norm (statistical techniques – commissions, rebate programs, etc .) Improve Working Capital: Duplicate Invoices (caught before check-run)

10 Exceptions Highlight Broken Processes Your time is freed up to partner with operations to add strategic value by helping to fix the processes that allowed the exceptions: Operational Audits Process Improvement Training Policy Development & Documentation System Enhancements Efficiency initiatives Quality Initiatives

11 The Business Case CCM can be a key control for Sarbanes-Oxley purposes but….Most companies rely on CCM for operational improvement and cost reductions with true ROI : Reduce operational & GRC costs Reduce external audit fees Stop Revenue “Leakage” Control and reconciliation automation Improve working capitalImprove Quality (and therefore future sales)Catch fraud attemptsImprove Compliance (preventing fines) Support Management information needs Policy Enforcement

Creating Value 12

Components of CCMGL AP ARSource Systems HR Other Replication Or ETL Replicated Data For Analysis Statistical and Analytical Routines Continuously Performed on Data Reports & Dashboards Invoice A123 from “Acme Solutions” in the amount of $543.21 may be a duplicate of invoice 123-1 in the amount of $543.21Dated 4-14-2010 from “Acme Inc.” Email Alerts Reporting Tool Exceptions Identified Exception Management Interface 13

Approach Step 1:Design Controls Workshop(s): Determine Risks and Control Use Cases needed Understand the systems involved Understand the Data Define Analytical Logic needed, by Use Case Define Exception Resolution workflow & Status Codes Develop High Level Architecture Security Requirements Create Design Document Step 2: Implement ETL Collaborate w/ IT: Set up hardware & Connectivity Select ETL Approach Develop ETL process Develop Transformations, if required Test Integrity and Impact on Production Environment Start scheduler/ Cron job Analytics DB In Place Create Exceptions DB Step 3: Develop Analytics Iteratively for Each Use Case: Develop Algorithm(s) Unit Testing: Review and refine to reduce false positives Set up Reports & Dashboards Tool (IIS or SharePoint) Set up Exceptions Management Interface System Documentation Step 4: User Components Develop Reports & Dashboards User Training User Acceptance Testing Tuning & Optimization Develop Email Alerts (Optional) Roll Out 14

15 Requirements Gathering Control Objective Functional Description of the control objective (Integrity Check) Functional Description of the Data Involved Triggering Event Financial Impact Data Specifics Data to Exclude from Analyzing Insufficiency Criteria Delay (if applicable) Data to Display Indicator(s) Exception Resolution Process Step 1: Design Controls

Export Transform & Load16 Step 2:Implement ETL Source Extract Transformations (if needed) Load Our Analytics DB Multiple ways to approach: Linked Server Object (typical for an Oracle DB Source) ETL Tools (such as SSIS; open source tools are available too) Replication (Publication/Subscription model) If Mirror or Replicated instance of production data is already available that is the preferred method. If not, indexed short running queries with “Read Only” accounts to pull in daily incremental activity and only from needed tables/columns, based on scheduled job (during non-peak hours ) is recommended. Key objective is automated availability of near real-time data needed to support continuous analytics Example of possible “Transformation”: Mapping might be needed to translate to parent’s Chart of Accounts or other common model from various autonomous systems to allow cross-comparisons Some analytics need to track “changes” to Master Data (Example: Vendor Master File Tampering Testing); in this case, we created logic to create versioned snapshots of records in the ETL logic Because we want the Exception to be able to be resolved by the Owner without them having to log into the source application, we pull all data needed to understand and resolve the Exceptions for presentation in the Exception Report

Specific Indicators17 Name Duplicate Amount Description Test for multiple occurrences of the same Amount being referenced by multiple invoices from the Same Vendor. Functional Logic / Algorithm For each given voucher, test all vouchers within the previous 60 days from the same vendor that are for the same amount. Probability 20% Name Duplicate PO Description Test for multiple occurrences of the same PO number being referenced by multiple invoices. Functional Logic / Algorithm For each given voucher, test all vouchers within the previous 60 days for the same PO number being referenced. Probability 80% Each Indicator becomes a part of the Where Clause and possibly helps drive joins Step 3: Develop Analytics

Script DevelopmentMultiple Indicators in SQL Step 3: Develop Analytics Select Exception ID (key), ‘Duplicate Invoice’ as ‘ Exception_Type ’, XXX as Probability, Etc…(All data needed) From Vouchers as V Join Vouchers as V_Same_PO on V.PO = V_Same_PO.PO Join Vouchers as V_Same_Amt on V.Amt = V_Same_Amt.Amt Where V.Vendor + V.InvNo <> V_Same_PO.Vendor + V_Same_PO.InvNo And ( V_Same_PO.VoucherNum not Null OR V_Same_Amt.VoucherNum not Null) 18

Script Development (continued)19 The “Probability” field in your select clause: Select 'Probability' = (case WHEN V.PO = V_Same_PO.PO THEN 80% end) + (case when V.Amt = V_Same_Amt.Amt then 20% end) From Table_X Step 3: Develop Analytics The Use of Probabilities

Script Development (continued)20 --5.7B Possible Duplicate Invoice: Same Invoice No and Amount for Similar Vendors, within 60 days. Insert into CCM.dbo.EXCEPTIONS_Stage SELECT Case when V_Dup.BUSINESS_UNIT in ('EMUNV') then 'EUV' else 'EHC' end AS COMPANY, '' AS DEPT_NUM, '' AS DEPT_NAME, 'EXCEPTION' AS TYPE, 'Procure to Pay' AS CATEGORY, '5.7B Possible Duplicate Invoice - Same Invoice No, Different But Similar Vendors' as Exception_Name , '5.7B' + V_Dup.BUSINESS_UNIT + V_Dup.Voucher_ID as EXCEPTIONID, GETDATE() AS EXCEPTION_DATE, V_Dup.OPRID_LAST_UPDT AS ASSOCIATED_USER, 'NEW' AS STATUS, '' AS EXCEPTION_OWNER, '' AS NOTES, INDICATORS = (case when CCM.dbo.fn_StrClean (ISNULL(V_Prior_Addr.ADDRESS1, ' ') + ISNULL(V_Prior_Addr.ADDRESS2, ' ') + ISNULL( V_Prior_Addr.City , ' ')) = CCM.dbo.fn_StrClean (ISNULL(V_Dup_Addr.ADDRESS1, ' ') + ISNULL(V_Dup_Addr.ADDRESS2, ' ') + ISNULL( V_Dup_Addr.City , ' ')) then 'Same Invoice Number for Vendors with Similar Address. ' else ' ' end) + (Case when CCM.dbo.fn_calculateJaroWinkler ( CCM.dbo.fn_StrClean (ISNULL(V_Name_Dup.NAME1, ' ')) , CCM.dbo.fn_StrClean (ISNULL(V_Name_Prior.NAME1, ' ') )) > .97 then 'Same Invoice Number for Vendors with Similar Name. ' else ' ' End ), Step 3: Develop Analytics Duplicate Invoice Actual Script PROBABILITY = (case when CCM.dbo.fn_StrClean (ISNULL(V_Prior_Addr.ADDRESS1, ' ') + ISNULL(V_Prior_Addr.ADDRESS2, ' ') + ISNULL( V_Prior_Addr.City , ' ')) = CCM.dbo.fn_StrClean (ISNULL(V_Dup_Addr.ADDRESS1, ' ') + ISNULL(V_Dup_Addr.ADDRESS2, ' ') + ISNULL( V_Dup_Addr.City , ' ')) then .6 End) + (Case when CCM.dbo.fn_calculateJaroWinkler (CCM.dbo.fn_StrClean(ISNULL(V_Name_Dup.NAME1, ' ')) , CCM.dbo.fn_StrClean(ISNULL(V_Name_Prior.NAME1, ' ') )) > .97 then .6 else (.5-.5) End), V_Dup.GROSS_AMT AS FINANCIAL_IMPACT, VAL_1 = V_Dup.INVOICE_ID , DEF_1 = 'Duplicate Invoice No.',VAL_2 = V_Prior.INVOICE_ID ,DEF_2 = 'Prior Invoice No',VAL_3 = V_Dup.GROSS_AMT,DEF_3 = 'Invoice Amt',VAL_4 = V_Dup.Voucher_ID,DEF_4 = 'Duplicate VoucherID',VAL_5 = V_Prior.Voucher_ID,DEF_5 = 'Prior_Voucher_ID',VAL_6 = V_Dup.VENDOR_ID,DEF_6 = 'Duplicate Vendor ID',VAL_7 = V_Prior.Vendor_ID,DEF_7 = 'Prior Vendor ID',

Script Development (continued)21 VAL_8 = V_Name_Dup.NAME1, DEF_8 = 'Duplicate Vendor Name', VAL_9 = V_Name_Prior.NAME1, DEF_9 = 'Prior Vendor Name', VAL_10 = V_Dup.Invoice_DT , DEF_10 = 'Duplicate Invoice Date', VAL_11 = V_Prior.INVOICE_DT , DEF_11 = 'Prior Invoice Date', VAL_12 = CCM.dbo.fn_StrClean (ISNULL(V_Dup_Addr.ADDRESS1, ' ') + ISNULL(V_Dup_Addr.ADDRESS2, ' ') + ISNULL( V_Dup_Addr.City , ' ')), DEF_12 = 'Scrubbed Duplicate Vendor Address', -- VAL_13 = CCM.dbo.fn_StrClean (ISNULL(V_Prior_Addr.ADDRESS1, ' ') + ISNULL(V_Prior_Addr.ADDRESS2, ' ') + ISNULL( V_Prior_Addr.City , ' ')), DEF_13 = 'Scrubbed Prior Vendor Address', VAL_14 = NULL, DEF_14 = NULL, VAL_15 = NULL, DEF_15 = NULL, VAL_16 = NULL, DEF_16 = NULL, VAL_17 = NULL, DEF_17 = NULL , Step 3: Develop Analytics VAL_18 = NULL, DEF_18 = NULL, VAL_19 = NULL, DEF_19 = NULL, VAL_20 = NULL, DEF_20 = NULL, VAL_21 = NULL, DEF_21 = NULL, VAL_22 = NULL, DEF_22 = NULL, VAL_23 = NULL, DEF_23 = NULL, VAL_24 = NULL, DEF_24 = NULL, VAL_25 = NULL, DEF_25 = NULL, VAL_26 = NULL,DEF_26 = NULL,VAL_27 = NULL,DEF_27 = NULL,VAL_28 = NULL,DEF_28 = NULL,VAL_29 = NULL,DEF_29 = NULL, VAL_30 = NULL,DEF_30 = NULLfrom CCM.dbo.PS_VOUCHER as V_Dup left outer join CCM.dbo.PS_VOUCHER as V_Prior on V_Prior.INVOICE_ID = V_Dup.INVOICE_ID and V_Prior.VENDOR_ID != V_Dup.VENDOR_ID and V_Prior.INVOICE_DT >= DATEADD( dd , -60, V_Dup.INVOICE_DT) and V_Dup.ENTERED_DT >= V_Prior.ENTERED_DT left outer join CCM.dbo.PS_VENDOR as V_Name_Dup on V_Name_Dup.VENDOR_ID = V_Dup.VENDOR_ID left outer join CCM.dbo.PS_VENDOR as V_Name_Prior on V_Name_Prior.VENDOR_ID = V_Prior.VENDOR_ID left outer Join CCM.dbo.PS_VENDOR_ADDR as V_Dup_Addr on V_Dup_Addr.VENDOR_ID = V_Dup.Vendor_ID and V_Dup_Addr.ADDRESS_SEQ_NUM = V_Dup.ADDRESS_SEQ_NUM left outer Join CCM.dbo.PS_VENDOR_ADDR as V_Prior_Addr on V_Prior_Addr.VENDOR_ID = V_Prior.Vendor_ID and V_Prior_Addr.ADDRESS_SEQ_NUM = V_Prior.ADDRESS_SEQ_NUM where V_Dup.ENTERED_DT >= DATEADD( dd , -5, V_Dup.INVOICE_DT ) and V_Prior.ENTRY_STATUS NOT IN ('X', 'R') and V_Prior.Vendor_ID is not null and V_Dup.GROSS_AMT = V_Prior.GROSS_AMT and ( CCM.dbo.fn_StrClean(ISNULL(V_Prior_Addr.ADDRESS1, ' ') + ISNULL(V_Prior_Addr.ADDRESS2, ' ') + ISNULL(V_Prior_Addr.City, ' ')) = CCM.dbo.fn_StrClean(ISNULL(V_Dup_Addr.ADDRESS1, ' ') + ISNULL(V_Dup_Addr.ADDRESS2, ' ') + ISNULL(V_Dup_Addr.City, ' ')) OR CCM.dbo.fn_calculateJaroWinkler(CCM.dbo.fn_StrClean(ISNULL(V_Name_Dup.NAME1, ' ')) , CCM.dbo.fn_StrClean(ISNULL(V_Name_Prior.NAME1, ' ') )) > .97 );GO Duplicate Invoice Actual Script (Continued)

22 Reporting Direct Reports against Transactional Data (Open PO’s > 90 days, Top 5 customers, Edit Checks, etc.) Exceptions Based/Meta Reporting (Top 5 types of exceptions, top 5 people/centers violating policy, etc.) Can be tabular or graphical Can we “webified” and made available to a broad audience Step 4: User Components

23 Use an Iterative Approach Area Integrity Check Value Complexity Total Score Development (1 Low to 5 Hi) (-1 Low to -5 Hi) Order PTP Duplicate Vouchers 5 -5 0 1 OTC Employee Sales of Damaged Goods 4 -3 1 2 OTC Unapplied Credit Memos > 90 days 5 -3 2 3 PTP Payables Discounts Not Taken 4 -1 3 4 OTC Unearned Discounts Taken 4 -2 2 5 PTP Open PO’s Over 90 Days 3 -1 2 6 OTC Picks exceed Order QTY 2 -1 1 7 OTC Largest Unpaid Balances 1 -1 0 8 PTP Received, not vouchered 2 -2 0 9 PTP Invoice w/out PO 3 -3 0 10 OTC Shipped, Not Invoiced 3 -3 0 11 OTC Shipped, No Invoice or $0 Invoice 3 -4 -1 12 OTC Unusual Quantity or Value of Inventory Adjustments 3 -5 -2 13 PTP Vendor is an Employee 2 -4 -2 14

24 Prioritizing Easy Complex Low Benefit High Benefit

Case Study – IssuesSignificant Control Weaknesses Decentralized structureMultiple disbursement processes Broadly distributed accessDuties not segregatedFew restrictions/discretionary accountsPoor monitoring controls Bleeding From a Thousand Cuts 1 million annually in inaccurate payments Multiple frauds Resource Limitations 25

Case Study – ConsiderationsDesire to be “Proactive vs. Reactive” Catch errors before paid BudgetNo Licensing fees/annual commitmentsFlexibility/Ease of Use Audit department to maintain/minimal IT support Growth potential: handle unlimited data sources and continually add new logic tests Communications (notice of exceptions; resolution) Transferability to management Reporting capabilities Security & Compliance The environment needed to be secure (SSL) to safeguard confidential information 26

Case Study – Why SEGWhy Emory decided to Partner with SEG and use an open-source solution: Subject Matter Expertise Cost effective/No additional licensing fees Co-Sourced Approach Leveraged use of existing technology/Not tied to vendorKnowledge transfer/ability to support in house Ability to deploy in a phased approach 27

Algorithms Created – Phase I Vendor Master Integrity Checks Conflicts of interest Duplicate vendorsVendor Master Tampering Payment Integrity Checks Duplicate Payments Potential personal purchases on corporate card Expenses / Per Diems Travel agent/employee ID not validated HR Checks Rehire of terminated employees New hire background checks FMLA Status Consistency FLSA Error Checking 28

SQL Replicated Data For Analysis Components of CCM At Emory Source Systems PeopleSoft HR, Payroll , Payables, Procurement Kronos LDAP VB Script ETL Statistical and Analytical Routines Continuously Performed on Data IIS Web Based Reports & Dashboards Exception Management Interface ASP.net Web form Reporting Tool Exceptions Identified Email Alerts Email Alerts generated embedded link to a report 29

Automated ProcessingAutomated notification of daily ETL feed and Analytics Success for Failure is sent to management, giving positive assurance that the application is continuously testing transactional data. Most days, no exception occurs, and there is nothing to report, so this allows confidence that the application is actually turned on and working. 30

Email AlertsWhen exceptions do occur, user specific Email Alerts are generated (when exceptions relevant to only specified users occur) with an embedded link to a report that only allows them to see authorized data unique to that user. 31

Security Considerations32 The Reports and Exception Management interface needed to be secure. We utilized the innate SSL capabilities that come with SQL Server and IIS. The high level steps to enable SSL Encryption are: Requesting a server certificate for the computer that is running IIS. If the IIS server already has a server certificate, you can go to step 4. Obtaining a server certificate from a certification authority. Installing the newly issued server certificate into IIS, Binding it. Enabling SSL encryption .

IIS Reporting 33

IIS Reporting 34

Alternate View35 Clicking the above link presents an Alternate view of all data related to that specific exception.

Alternate View (continued) 36 Scrolling down to bottom, the user can click the link to enter “Edit Mode” (shown on next screen shot).

Edit Mode37

Edit Mode38 After updating the information, user clicks the “Update” link

Update Success39

Management Reporting40

Case Study - Results41

Case Study - ROIImplementation costs recovered in 6 weeks Duplicate payments (invoices and supplemental pay)Caught prior to disbursement (reduced costs to correct) Control Effectiveness Monitoring ResultsConflicts of interestExpenses/ Per Diems Rehire of terminated employees Inconsistent FMLA status Travel agent/employee ID not validated Future Opportunities/Next Steps Revenue RAC Audits Compliance: grants and contracts Removal of network access for terminated employees Statistical analysis 42

Does CCM Make Sense For Your Company? Any manual processes subject to human error?Any Manual Audits or Reconciliations?Any recurring Analytical procedures that consume a lot of time or are pain-points? Concerns about policy compliance?Concerns about employee theft? If the answer is “yes” to any of these, it is likely that CCM can bring solid value to your company enabling you to increase its Audit Capability Maturity Level while allowing the finance and audit teams to show their strategic value to the rest of the company. 43

For More Information Wylie Roberts, CPA SolomonEdwards Sr. Manager, Business Advisory Services wroberts@solomonedwards.com Cell: 404-218-6892 SolomonEdwardsGroup, LLC Atlanta Office Five Concourse Parkway, Suite 1450 Atlanta, Georgia 30328 Scott Stevenson, CIA, CPA Emory University Associate Chief Audit Officer Office: 404-686-2916 sjsteve@emory.edu