-
21
-
22
Comparative Analysis of Methodologies for the development of Computer Audits considering: Risk Analysis, Data Mining, Reference Frameworks and Standards and International Standards for Standardization
Published 2023-06-01Subjects: “…Computer Auditing, Computer Auditing Methodology, Risk Analysis, Data Mining, Reference Frames, ISO standards…”
Get full text
Article -
23
Sound of Daily Living Identification Based on Hierarchical Situation Audition
Published 2023-04-01Subjects: “…computer audition…”
Get full text
Article -
24
Battling with the low-resource condition for snore sound recognition: introducing a meta-learning strategy
Published 2023-10-01Subjects: “…Computer audition…”
Get full text
Article -
25
The Digital Component of Modern Audit of Activities of Business Entities
Published 2021-04-01Subjects: “…computer audit…”
Get full text
Article -
26
CovNet: A Transfer Learning Framework for Automatic COVID-19 Detection From Crowd-Sourced Cough Sounds
Published 2022-01-01“…Since the COronaVIrus Disease 2019 (COVID-19) outbreak, developing a digital diagnostic tool to detect COVID-19 from respiratory sounds with computer audition has become an essential topic due to its advantages of being swift, low-cost, and eco-friendly. …”
Get full text
Article -
27
Transforming healthcare through a digital revolution: A review of digital healthcare technologies and solutions
Published 2022-08-01“…Artificial Intelligence (AI), big data, telemedicine, robotic solutions, Internet of Things (IoT), digital platforms for communication (DC), computer vision, computer audition (CA), digital data management solutions (blockchain), digital imaging are premiering to assist healthcare workers (HCW's) with solutions that include case base surveillance, information dissemination, disinfection, and remote consultations, along with many other such interventions.…”
Get full text
Article -
28
Rekabentuk dan pembangunan sistem pakar pengauditan berkomputer : kajian kes di UTM
Published 1990“…This article is a part one of the project on the design and development of an computer auditing expert system for UTM. Due to the fact that the field of computer auditing is new not only to the society in UTM, but also in Malaysia in general, this article has started off by explaining the concepts involved in computer auditing. …”
Get full text
Article -
29
Audit Process during Projects for Development of New Mobile IT Application
Published 2010-01-01“…This paper presents characteristics of the computer audit process during software development life cycle focused on specific aspects of the mobile IT applications. …”
Get full text
Article -
30
EDP audit & controls ' : a better realization of EDP audit & control in Malaysia/
Published [199“…Keynote address/Y Bhg Tan Sri Ishak Tadin -- A survey of EDP auditing, controls & security in Malaysia/Ros Alinda Alias,Habit Noh Sayid Seman, Zailani Mohamed Sidek -- Information system audit technology : trends and applications/Prof Hart J Will -- Expert system's development in computer auditing : the UTM experience/Zailani Mohamed Sidek, Zuraini Ismail, Tajaludin Sharif -- Current practices in computer auditing in Malaysia - private sector/Ong Ai Lin -- Computer auditing in public sector/Ab Rahman Mohamed -- Boundary controls in computer security/Zainab Abu Bakar, Kalsom Nasir -- Auditing and managing of computer resources/Chin Kim Leong -- Controlling end-user computing/Mohd Hasan Selamat, Mohamed Othman, Abu Talib Othman -- Disaster recovery awareness gaining management committment/Monica Holtforster…”
-
31
-
32
Scientific and Technological Development and its Impact on Auditing and Control of Management
Published 2016-06-01“…Therefore, the objective of this research is to analyze the role of information systems in the audit, using the method of analysis-synthesis and logical historical, concluding that it is not only the use of information technology in audit, but the computer audit is feasible and possible to reduce costs, improve quality of information, fraud prevention and social satisfaction.…”
Get full text
Article -
33
Auditoría de seguridad informática siguiendo la metodología OSSTMMv3: caso de estudio
Published 2017-11-01“…ABSTRACT This article explains the methodology followed in computing auditing in terms of security where OSSTMM version 3 was taken as reference methodology and implemented in GAD-Mira. …”
Get full text
Article -
34
Measure cross-sectoral structural similarities from financial networks
Published 2023-05-01“…Besides the direct applications in computational audit, we expect this approach to be of use at multiple scales, from firms to countries, potentially elucidating structural risks at a broader scale.…”
Get full text
Article -
35
Green Electronic Auditing and Accounting Information Reliability in the Jordanian Social Security Corporation: The Mediating Role of Cloud Computing
Published 2023-09-01“…The researcher used structural equation modeling to investigate the connections between cloud computing, auditing on data processing processes, auditing the inputs, auditing the outputs, prior auditing on inputs, and accounting information reliability. …”
Get full text
Article -
36
Junior scientists spotlight social bonds in seminars for diversity, equity, and inclusion in STEM.
Published 2023-01-01“…Our approach to scholar profiles and talk transcripts serves as an example for transmuting hundreds of hours of scholarly discourse into rich datasets that can power computational audits of speaker diversity and illuminate speakers' personal and professional priorities.…”
Get full text
Article -
37
Exploring the Key Risk Factors for Application of Cloud Computing in Auditing
Published 2016-08-01“…The dimensions/perspectives of the application of cloud computing audit considerations are huge and cover many criteria/factors. …”
Get full text
Article -
38
-
39
-
40
Auditoría de gestión de seguridad informática, en entidades públicas y privadas en Loja
Published 2017-11-01“…Keywords: Computer asset, computer audit, risk management, securities, ISO/IEC 27002, MAGERIT. …”
Get full text
Article