نتایج جستجو برای: traditional based audit

تعداد نتایج: 3136544  

Journal: :basic and clinical cancer research 0
kazem zendehdel cancer research center, tehran university of medical sciences, iran, department of medical epidemiology and biostatistics, karolinska institute, sweden zahra sedighi cancer research center, tehran university of medical sciences, iran jaleh hassanloo cancer research center, tehran university of medical sciences, iran azin nahvijou cancer research center, tehran university of medical sciences, iran

background: cancer registries are important infrastructure for cancer control programs. however most developing countries lack population based cancer registry. in iran there cancer incidence is estimated based on pathology-based cancer registry. in this study we evaluated results of the nationwide pathology-based cancer registry in iran. materials and methods: we compared age-standardized inci...

2003
Josef Schiefer Jun-Jang Jeng Robert M. Bruckner

Workflow management systems are being increasingly used by many organizations to automate business processes and decrease costs. Audit trails from workflow management systems include significant amounts of information that can be used to analyze and monitor the performance of business processes in order to improve the efficiency. Traditional approaches for using workflow audit trail for decisio...

Mohammad Ebrahim Pourzarandi Shadi Shams Majd

Internal audit is a process affected by an entity ‘s board of directors, management and other personnel, designed to provide reasonable assurance regarding the achievement of objectives relating to operations, reporting and compliance. This definition reflects certain fundamental concepts. Internal control is: • Geared to achievement of objectives in one or more categories operations, reporti...

Journal: :Computer Networks 2007
Animesh Patcha

With the ever increasing deployment and usage of gigabit networks, traditional network anomaly detection based Intrusion Detection Systems (IDS) have not scaled accordingly. Most, if not all, intrusion detection systems (IDS) assume the availability of complete and clean audit data. We contend that this assumption is not valid. Factors like noise, mobility of the nodes and the large amount of n...

2014
Frank Doelitzscher

Security Audit Compliance For Cloud Computing Frank Hans-Ulrich Doelitzscher MSc Cloud computing has grown largely over the past three years and is widely popular amongst today’s IT landscape. In a comparative study between 250 IT decision makers of UK companies they said, that they already use cloud services for 61% of their systems. Cloud vendors promise “infinite scalability and resources” c...

هدف این مطالعه بررسی تاثیر دو جنبه کیفیت حسابرسی داخلی یعنی صلاحیت و همکاری حسابرس داخلی در حسابرسی صورتهای مالی است. مطابق تئوری جانشینی حسابرس مستقل با اتکا به نتایج کار حسابرس داخلی در تلاش های خود صرفه جویی می‌کند که این امر بر حق الزحمه حسابرس مستقل تاثیر خواهد گذاشت. دو ویژگی کیفی حسابرسی داخلی (صلاحیت و همکاری) منجر به حمایت از دیدگاه جانشینی برای توضیح رابطه بین کیفیت حسابرسی داخلی و حق...

Nasirpour, Nasim , Abbasian, Mohammad Mehdi , Pour Aghajan, Abbas Ali,

Objectives: The purpose of this study was to investigate the effect of personality organization, job stress and ego strength on predicting audit quality in auditing organizations and independent audit companies. Method: The statistical population of this study is all auditors of the audit organization with 191 individuals and independent audit companies with 208 companies, which included at le...

Increasing the number of audit firms and increasing the level of expectations and environmental changes make the issue of competition among audit firms more complex and reveal the levels of information for users and stakeholders more dynamic. The role of audit firms is considered to be critical to the promotion of social trust, and institutions that do not have the ability to compete in this fi...

2009
Yurdaer N. Doganata Francisco Curbera

The effect of using automated auditing tools to detect compliance failures in unmanaged business processes is investigated. In the absence of a process execution engine, compliance of an unmanaged business process is tracked by using an auditing tool developed based on business provenance technology or employing auditors. Since budget constraints limit employing auditors to evaluate all process...

2014
Jean Bacon Olivier Hermant David Eyers

The CloudSafetyNet project is investigating the potential of Information Flow Control (IFC) as a technology for cloud computing. Security concerns are widely seen as an obstacle to the adoption of cloud computing solutions and although a wealth of law and regulation has emerged, the technical basis for enforcing and demonstrating compliance lags behind. IFC complements traditional security tech...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید