نتایج جستجو برای: systems audit
تعداد نتایج: 1208818 فیلتر نتایج به سال:
The necropsy rate in the United Birmingham Hospital has fallen from 74-4% in 1958 to 46-0% in 1972. In the Birmingham region as a whole the rate is 27-3%, approximately equal to the national rate. Most clinicians in the group who replied to a standard questionary considered that the necropsy still has an important part to play in their own practice and in undergraduate training, and they viewed...
This paper analyzes the choice between different external technology sourcing activities of a firm. On one hand, the firm can acquire new technology which is embodied in personnel. On the other hand, the firm can obtain new technology disembodied through a licensing agreement or by outsourcing the technology development from an R&D contractor. Building on Cassiman and Veugelers (2006), we test ...
The voting audit logs produced by electronic voting systems contain data that could be useful for uncovering procedural errors and election anomalies, but they are currently unwieldy and difficult for election officials to use in post-election audits. In this work, we develop new methods to analyze these audit logs for the detection of both procedural errors and system deficiencies. Our methods...
Security is a key issue in the design and implementation of complex information systems. Security mechanisms and policies have to be deployed and then continuously maintained, monitored and audited. Auditing information is of great usefulness, but diicult to manage. Thus, several tools for security audit trail analysis have been developed to assist audit trails analysts in their work. Great eeo...
Process Mining and Security: Detecting Anomalous Process Executions and Checking Process Conformance
One approach to secure systems is through the analysis of audit trails. An audit trail is a record of all events that take place in a system and across a network, i.e., it provides a trace of user/system actions so that security events can be related to the actions of a specific individual or system component. Audit trails can be inspected for the presence or absence of certain patterns. This p...
in this thesis, using concepts of wavelets theory some methods of the solving optimal control problems (ocps). governed by time-delay systems is investigated. this thesis contains two parts. first, the method of obtaining of the ocps in time delay systems by linear legendre multiwavelets is presented. the main advantage of the meth...
Achieving information security in the cloud is not a trivial exercise. When the systems involved are accounting software systems, this becomes much more challenging in the cloud, due both to the systems architecture in use, the challenges of proper configuration, and to the multiplicity of attacks that can be made against such systems. A particular issue for accounting systems concerns maintain...
background: alcohol use disorders (auds) has been recently prioritized as a health problem in iran. the alcohol use disorders identification test (audit) is an easy-to-use diagnostic tool for excessive drinking. this study was designed to assess the validity and reliability of the persian version of audit questionnaire. methods: participants were 70 individuals with aud (study group) and 70 non...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید