نتایج جستجو برای: auditor choice
تعداد نتایج: 197022 فیلتر نتایج به سال:
The ubiquitous nature of the internet and the diversity of user groups means that established techniques for accessibility evaluation may need to evolve in order to be effective. This paper describes the development of a web accessibility auditing instrument, known as the Accessibility Evaluation Assistant (AEA) designed to assist novice auditors in the process of an accessibility evaluation fo...
1 SUMMARY Auditors often consider a stratified finite population where each unit is classified as either acceptable or in error. Based on a random sample the auditor may be required to give an upper confidence bound for the number of units in the population that are in error. In other cases the auditor may need to give a p value for the hypothesis that at least 5% of the units in the population...
A basic method in computer security is to perform integrity checks on the file system to detect the installation of malicious programs, or the modification of sensitive files. Integrity tools to date rely on the operating system to function correctly, so once the operating system is compromised even a novice attacker can easily defeat these tools. A novel way to overcome this problem is the use...
Corporate accounting failures and regulatory proceedings that led to the enactment of the Sarbanes–Oxley Act of 2002 increased the scrutiny of auditors. We investigate whether these events resulted in a change in auditor behavior with respect to going concern reporting. Generally speaking, we find that non-Big N auditors became more conservative while Big N auditors became more accurate. Specif...
A growing number of online services, such as Google, Yahoo!, and Amazon, are starting to charge users for their storage. Customers often use these services to store valuable data such as email, family photos and videos, and disk backups. Today, a customer must entirely trust such external services to maintain the integrity of hosted data and return it intact. Unfortunately, no service is infall...
Link error and malicious nodes are responsible for packet drop in wireless ad hoc networks. When we observe a sequence of packet losses, may be due to link errors only, or by both link errors and malicious drop, we should determine the malicious node. In the insider-attack case, whereby malicious nodes that are part of the route exploit their knowledge of the interactions to drop a small amount...
Top management turnover can be classified into forced turnover and voluntary turnover. Forced CEO turnover may be triggered by poorer operating performance (Helwege et al. 2012) that fails to meet the expectation of corporate board; this pressure of immediate performance improvement may induce the incoming CEO to engage in earnings management (SAS No.99, AICPA 2002), and in turn increase the li...
This research proposes a novel method for ensuring fair governance of a common resource using asymmetric anonymity. We propose a system of resource governance that uses anonymous auditors instead of a regulatory agency. Self-enforcement and mutual enforcement are subject to fraud and collusion. In the proposed governance system, anonymity, often associated with negative online interactions, is ...
Tujuan penelitian ini untuk mengetahui Tekanan Anggaran Waktu, Locus Of Control, Kompleksitas. Tugas dan Turnover Intention berpengaruh terhadap perilaku disfungsional auditor pada KAP di Provinsi Bali. Jumlah sampel adalah 82 Auditor. Teknik pengambilan yang digunakan metode non-probability sampling. analisis data dalam regresi linier berganda. Berdasarkan dari hasil ditemukan Waktu Control ne...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید