نتایج جستجو برای: traditional based audit

تعداد نتایج: 3136544  

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده مدیریت 1392

data envelopment analysis (dea) is a powerful tool for measuring relative efficiency of organizational units referred to as decision making units (dmus). in most cases dmus have network structures with internal linking activities. traditional dea models, however, consider dmus as black boxes with no regard to their linking activities and therefore do not provide decision makers with the reasons...

Journal: :Journal of the College of Physicians and Surgeons--Pakistan : JCPSP 2017
Ali Mansoor Amaila Ramzan Aamer Nadeem Chaudhary

light of recommendations of ACR. STUDY DESIGN Aclinical audit. PLACE AND DURATION OF STUDY Department of Radiology, Jinnah Hospital, Lahore, from August 2015 to February 2016. METHODOLOGY Scans of 20 patients who underwent MRI of knee in August 2015 were studied retrospectively to assess the quality of images obtained in the first audit. Based on the findings of this audit, recommendation...

2011
Harry Gibbs John Fletcher Peter Blombery Renea Collins David Wheatley

BACKGROUND Venous thromboembolism (VTE) is a major health and financial burden. VTE impacts health outcomes in surgical and non-surgical patients. VTE prophylaxis is underutilized, particularly amongst high risk medical patients. We conducted a multicentre clinical audit to determine the extent to which appropriate VTE prophylaxis in acutely ill hospitalized medical patients could be improved v...

Journal: :Nursing standard (Royal College of Nursing (Great Britain) : 1987) 2013
William Gage

Good nursing handover is central to the delivery of high-quality care. However, there are no national tools available to audit and benchmark practice standards in this area. Following a review of the literature, evidence-based best practice standards were identified and used by the author to audit nursing handover in one acute NHS trust in the UK. Results of the audit were used to assure qualit...

2017
Andrew Sutton Reza Samavi

Privacy audit logs are used to capture the actions of participants in a data sharing environment in order for auditors to check compliance with privacy policies. However, collusion may occur between the auditors and participants to obfuscate actions that should be recorded in the audit logs. In this paper, we propose a Linked Data based method of utilizing blockchain technology to create tamper...

2015
Consuelo B Gonzalez-Suarez Janine Margarita R Dizon Karen Grimmer Myrna S Estrada Lauren Anne S Liao Anne-Rochelle D Malleta Ma Elena R Tan Vero Marfil Cristina S Versales Jimah L Suarez Kleon C So Edgardo D Uyehara

BACKGROUND Stroke is one of the leading medical conditions in the Philippines. Over 500,000 Filipinos suffer from stroke annually. Provision of evidence-based medical and rehabilitation management for stroke patients has been a challenge due to existing environmental, social, and local health system issues. Thus, existing western guidelines on stroke rehabilitation were contextualized to draft ...

2012
Khairina Rosli

Many businesses are now moving to e-business and implementing computerized accounting information systems. This phenomenon has given impact to audit profession in performing IT audit, financial reports audit and tracing electronic source documents. Computer-Assisted-Auditing Techniques and Tools (CAATTs) are audit technologies that allow IT audit work to be performed efficiently, effectively an...

Journal: :The British journal of general practice : the journal of the Royal College of General Practitioners 1997
J R Lough T S Murray

BACKGROUND Audit is a criterion for training in general practice, and registrars are reliant on their trainers' teaching of basic audit methods. Their ability to teach this had been assumed, but registrars' projects submitted as part of summative assessment offered an opportunity to test this. AIM To test trainers' knowledge of basic audit methods. Their knowledge was based on an ability to r...

2004
Tatyana Ryutov Clifford Neuman Li Zhou

Traditional Intrusion Detection Systems (IDSs) work in isolation from access control for the application the systems aim to protect. The lack of coordination and inter-operation between these components prevents detecting sophisticated attacks and responding to ongoing attacks in real time, before they cause damage. Another disadvantage is a large number of false positives. Reports of attacks c...

2013
Paulo Roberto de Lima Lopes Frederico Molina Cohrs Ivan Torres Pisa

INTRODUCTION / BACKGROUND: Audit requirements provide for software quality assurance and can be performed in different moments of its lifecycle. Functional and Non-Functional requirements relate each other at least once but in many cases at a higher rate, causing dependency and correlation effects that may increase the complexity of audit work. OBJECTIVES: Discuss methods to aid auditors for a ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید