نتایج جستجو برای: traditional based audit

تعداد نتایج: 3136544  

2012
Leif Appelgren

The aim of this project has been to study the possibility to apply audit strategies developed for taxation on fraud and involuntary errors in the social benefit sector. The efficiency of different audit strategies is compared using a computer-based optimization algorithm. Two types of audit strategies are used in this study. One is to adapt the audit intensity to the propensity for errors and f...

Journal: :nursing and midwifery studies 0
sarieh poortaghi department of community health nursing, school of nursing and midwifery, tehran university of medical sciences, tehran, ir iran mahvash salsali department of international affairs deputy, school of nursing and midwifery, tehran university of medical sciences, tehran, ir iran abbas ebadi behavioral sciences research center (bsrc), nursing faculty, baqiyatallah university of medical sciences, tehran, ir iran; behavioral sciences research center (bsrc), nursing faculty, baqiyatallah university of medical sciences, tehran, ir iran. tel: +98-212612737, fax: +98-2122286057 zahra rahnavard department of community health nursing, school of nursing and midwifery, tehran university of medical sciences, tehran, ir iran farzaneh maleki department of community health nursing, school of nursing and midwifery, tehran university of medical sciences, tehran, ir iran

conclusions nursing process indicators can be used to audit nursing care. such audits can be used as quality assurance tools. results the compliance rate of nursing process indicators was 79.71 ± 0.87. mean compliance scores did not significantly differ by education level and gender. however, overall compliance scores were correlated with nurses’ age (r = 0.26, p = 0.001) and work experience (r...

Journal: :Journal of Computer Security 1999
Thomas E. Daniels Eugene H. Spafford

Conventional host-based and network-based intrusion and misuse detection systems have concentrated on detecting network-based and internal attacks, but little work has addressed host-based detection of low-level network attacks. A major reason for this is the misuse detection system’s dependence on audit data and the absence of low-level network data in audit trails. This work defines low-level...

    Audit quality is a fundamental element that reflects the demand for audit services. Also, high audit quality improves the credibility and continuity of profession and audit firms. The purpose of this study is to investigate the Premature Sign-Off Procedures and Underreporting Time of Audit as reducing the quality of audit and, ultimately, the long-term interests of audit firms. In this rega...

Fraud in financial reporting and accounting has grown significantly in recent years due to the financial crises created in companies, so that fraud has become a political and economic issue and today the legislature, the accounting profession and the causes The creation of fraud in it as well as the ways to deal with fraudulent behavior in financial statements have received special attention. T...

Journal: :Informatics in primary care 2009
Vijal Parmar Ann Large Colm Madden Vijay Das

BACKGROUND The 'Choose and Book' system provides an online booking service which primary care professionals can book in real time or soon after a patient's consultation. It aims to offer patients choice and improve outpatient clinic attendance rates. OBJECTIVE An audit comparing attendance rates of new patients booked into the Audiological Medicine Clinic using the 'Choose and Book' system wi...

Journal: :Irish medical journal 2013
A Grover E Duggan

We audited verbal handover of information by anaesthetists to recovery room nurses based on Situation, Background, Assessment and Recommendation. In Audit A, 100 handovers for elective procedures were included. For audit B, a second cohort of 100 patients was examined post educational session. There was an improvement in handover of medical background (46.15% Audit A, 77% Audit B, p < 0.001) an...

2007
Giovanni Vigna

Security is a key issue in the design and implementation of complex information systems. Security mechanisms and policies have to be deployed and then continuously maintained, monitored and audited. Auditing information is of great usefulness, but diicult to manage. Thus, several tools for security audit trail analysis have been developed to assist audit trails analysts in their work. Great eeo...

2007
Zachary N. J. Peterson Randal C. Burns Giuseppe Ateniese Stephen Bono

We present constructs that create, manage, and verify digital audit trails for versioning file systems. Based upon a small amount of data published to a third party, a file system commits to a version history. At a later date, an auditor uses the published data to verify the contents of the file system at any point in time. Digital audit trails create an analog of the paper audit process for fi...

Journal: :Journal of clinical pathology 1995
A J Mifsud M S Shafi

AIM To set up a programme of internal laboratory audit in a medical microbiology laboratory. METHODS A model of laboratory based process audit is described. Laboratory activities were examined in turn by specimen type. Standards were set using laboratory standard operating procedures; practice was observed using a purpose designed questionnaire and the data were analysed by computer; performa...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید