نتایج جستجو برای: auditing costs

تعداد نتایج: 181378  

2011
G. Murali

Network Security Scanner (NSS) is a tool that allows auditing and monitoring remote network computers for possible vulnerabilities, checks your network for all potential methods that a hacker might use to attack it. Network Security Scanner is a complete networking utilities package that includes a wide range of tools for network security auditing, vulnerability Auditing, scanning, monitoring a...

2013
Mirelle Hanskamp-Sebregts Marieke Zegers Wilma Boeijen Gert P Westert Petra J van Gurp Hub Wollersheim

BACKGROUND Auditing of patient safety aims at early detection of risks of adverse events and is intended to encourage the continuous improvement of patient safety. The auditing should be an independent, objective assurance and consulting system. Auditing helps an organisation accomplish its objectives by bringing a systematic, disciplined approach to evaluating and improving the effectiveness o...

ژورنال: دانش حسابرسی 2021
, ,

Accountability refers to the commitment of public sector organizations and managers to make decisions about public resources and their other social responsibilities According to agency theory. Efforts to improve public accountability and move towards good governance are the demands of all citizens. One of the tools that can help improve public accountability is the implementation of performance...

1991
Miklos A. Vasarhelyi Fern B. Halper

The evolution of MIS technology has affected traditional auditing and created a new set of audit issues. This paper focuses on the Continuous Process Auditing System (CPAS) developed at AT&T Bell Laboratories for the Internal Audit organization. The system is an implementation of a Continuous Process Audit Methodology (CPAM) and is designed to deal with the problems of auditing large paperless ...

2014
S. Hemalatha R. Manickachezian

In the current era of cloud computing, Cloud storage is a significant service of cloud computing where data stored in the cloud is being generated at high speed and thus the cloud storage system has become one of the key components in cloud computing. Data owner host their data and data consumers can use the data on and from the server. The security issue arises due to the data outsourcing. Thi...

Journal: :IACR Cryptology ePrint Archive 2014
Solomon Guadie Worku Chunxiang Xu Jining Zhao Xiaohu He

Recently, Worku et al. pointed out that the work “privacy-preserving public auditing for data storage security in cloud computing” proposed by Wang et al. is insecure and their second work “privacypreserving public auditing for secure cloud the storage” is inefficient. Thus, they offered a secure and efficient-privacy public auditing scheme for cloud storage. They claimed that their system is p...

2014
Numanul Subhani Robert Kent

Continuous Auditing (CA) has been investigated over time and it is, somewhat, in practice within financial and transactional auditing as a part of continuous assurance and monitoring. Enterprise Information Systems that run their activities in the form of processes require continuous auditing of a process that invokes the action(s) specified in the policies and rules in a continuous manner. A s...

2004
Douglas W. Jones

After everyone has voted, the votes in each ballot position are counted, and the winner of each race is declared. Barring the use of some form of ranked-preference ballot, the algorithms required are hardly more than mere summations. What makes elections difficult is the problem of performing this summation over a canvassing hierarchy spanning many polling places and local election offices, whe...

2002
Sean Gailmard

I examine a model in which a bureaucrat performs a project for multiple legislative principals. The cost of the project is publicly observable but the bureaucrat’s (exogenous) efficiency and (endogenous) cost reducing activities are not. The principals can each perform a costly audit of the bureaucrat’s type for use in the design of incentive schemes, and the information may also be useful for ...

2003
Andrew F. Daughety Jennifer F. Reinganum

We employ a simple two-period model to show that the use of confidential settlement as a strategy for a firm facing tort litigation leads to lower average product safety than that which would be produced if a firm were committed to openness. Moreover, confidentiality can even lead to declining average product safety over time. We also show that a rational risk-neutral consumer’s response to a m...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید