نتایج جستجو برای: auditing costs

تعداد نتایج: 181378  

2009
Jeffrey Perloff Guojun He Jeffrey M. Perloff

Auditing by downstream firms has limited effects on Chinese firms’ adherence to labor standards and other measures of blue collar workers well-being. Auditing does not affect the suppliers’ blue-collar employees’ wages, probability of belonging to a union, or likelihood of working overtime. However, audited firms are more likely to provide rural migrant workers pensions, business medical insura...

Journal: :Applied sciences 2023

The information obtained from external sources within the cloud and resulting computations are not always reliable. This is attributed to absence of tangible regulations management on part owners. Although numerous techniques for safeguarding securing have been developed, security hazards in still problematic. could potentially pose a significant challenge effective adoption utilization technol...

Journal: :International Journal of Advanced Computer Science and Applications 2018

2004
Bruno Cortes José Nuno Oliveira

This paper presents a strategy for applying sampling techniques to relational databases, in the context of data quality auditing or decision support processes. Fuzzy cluster sampling is used to survey sets of records for correctness of business rules. Relational algebra estimators are presented as a data quality-auditing tool.

Journal: :journal of health management and informatics 0
hamid moghaddasi reza rabiei nasrin sadeghi

introduction: the review of medical records with the aim of assessing the quality of codes has long been conducted in different countries. auditing medical coding, as an instructive approach, could help to review the quality of codes objectively using defined attributes, and this in turn would lead to improvement of the quality of codes. method: the current study aimed to present a model for au...

2007
Nathan Whitehead Jordan Johnson Martín Abadi

Both proofs and trust relations play a role in security decisions, in particular in determining whether to execute a piece of code. We have developed a language, called BCIC, for policies that combine proofs and trusted assertions about code. In this paper, using BCIC, we suggest an approach to code auditing that bases auditing decisions on logical policies and tools.

2015
K. Subramani

Cloud computing becomes one of the emerging technology on now a days to share and manage their data in organization , because of its forcefulness, small communication cost and everywhere environment. Privacy preservation concern in the cloud computing becomes arise several security challenges since information stored in the cloud data is easily outsourced anywhere at any time. To manage this pr...

Journal: :Journal of Computer and System Sciences 2003

Journal: :Quality and Safety in Health Care 1994

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید