Journal articles on the topic 'Auditabilité'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Auditabilité.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Johari, Razana Juhaida, and Sayed Alwee Hussnie Sayed Hussin. "Enhancing management integrity through auditability concept: a literature review." Humanomics 32, no. 4 (November 14, 2016): 516–24. http://dx.doi.org/10.1108/h-09-2016-0069.
Full textResearch Committee. "Systems auditability and control." Computer Audit Update 1992, no. 1 (January 1992): 18–20. http://dx.doi.org/10.1016/0960-2593(92)90028-l.
Full textHinde, Stephen. "Management's responsibility for auditability." Computer Audit Update 1996, no. 7 (July 1996): 2–4. http://dx.doi.org/10.1016/0960-2593(96)88545-4.
Full textJerard, V. Joseph Michael, and P. Manimegalai. "Content arrangement characteristic based encryption in cloud using public auditing for data management." International Journal of Engineering & Technology 7, no. 1.1 (December 21, 2017): 30. http://dx.doi.org/10.14419/ijet.v7i1.1.8918.
Full textJones, James H. "2.4.3 Verification “Auditability” can be “Free”." INCOSE International Symposium 12, no. 1 (August 2002): 710–18. http://dx.doi.org/10.1002/j.2334-5837.2002.tb02530.x.
Full textBhaskar, Krish. "Security: User requirements, workstations, and auditability." Computer Fraud & Security Bulletin 9, no. 7 (May 1987): 3–9. http://dx.doi.org/10.1016/0142-0496(87)90038-5.
Full textVijaya Swetha, K., P. Sai Kiran, and K. V. V. Satyanarayana. "Privacy and Auditability in Cloud Assisted Health Data." Asian Journal of Information Technology 18, no. 4 (December 20, 2019): 133–38. http://dx.doi.org/10.36478/ajit.2019.133.138.
Full textSlesinger, Gay. "Electronic commerce: How to ensure control and auditability." Journal of Corporate Accounting & Finance 4, no. 3 (1993): 319–27. http://dx.doi.org/10.1002/jcaf.3970040307.
Full textKumaresan, M., and G. K. D. Prasanna Venkatesan. "An Effective Scheduling Algorithm for Auditability Awareness using Cloud." Asian Journal of Research in Social Sciences and Humanities 6, no. 11 (2016): 588. http://dx.doi.org/10.5958/2249-7315.2016.01215.6.
Full textKumaresan, M., and G. K. D. Prasanna Venkatesan. "An Effective Scheduling Algorithm for Auditability Awareness using Cloud." Asian Journal of Research in Social Sciences and Humanities 6, no. 12 (2016): 154. http://dx.doi.org/10.5958/2249-7315.2016.01284.3.
Full textde Albuquerque, Denis J. S., Vanessa Tavares Nunes, Claudia Cappelli, and Célia Ghedini Ralha. "Towards Auditability Requirements Specification using an Agent-based Approach." International Journal of Software Engineering & Applications 11, no. 3 (May 31, 2020): 19–37. http://dx.doi.org/10.5121/ijsea.2020.11302.
Full textTian, Hui, Zhaoyi Chen, Chin-Chen Chang, Minoru Kuribayashi, Yongfeng Huang, Yiqiao Cai, Yonghong Chen, and Tian Wang. "Enabling public auditability for operation behaviors in cloud storage." Soft Computing 21, no. 8 (August 11, 2016): 2175–87. http://dx.doi.org/10.1007/s00500-016-2311-y.
Full textCazenave, Bruno, and Jeremy Morales. "NGO responses to financial evaluation: auditability, purification and performance." Accounting, Auditing & Accountability Journal 34, no. 4 (February 15, 2021): 731–56. http://dx.doi.org/10.1108/aaaj-01-2020-4397.
Full textNanda, Satria Tri. "PROFESSIONAL ATTRIBUTES OF INTERNAL AUDITORS IN RIAU." Jurnal Benefita 3, no. 2 (July 31, 2018): 161. http://dx.doi.org/10.22216/benefita.v3i2.2891.
Full textNanda, Satria Tri. "PROFESSIONAL ATTRIBUTES OF INTERNAL AUDITORS IN RIAU." Jurnal Benefita 3, no. 2 (July 31, 2018): 161. http://dx.doi.org/10.22216/jbe.v3i2.2891.
Full textAlles, Michael, and Miklos A. Vasarhelyi. "Thick data: adding context to big data to enhance auditability." International Journal of Auditing Technology 2, no. 2 (2014): 95. http://dx.doi.org/10.1504/ijaudit.2014.066237.
Full textBeck, Cheryl Tatano. "Qualitative Research: The Evaluation of Its Credibility, Fittingness, and Auditability." Western Journal of Nursing Research 15, no. 2 (April 1993): 263–66. http://dx.doi.org/10.1177/019394599301500212.
Full textMenkus, Belden. "Too Many Client/Server Systems Ignore Security, Quality, and Auditability." EDPACS 22, no. 5 (November 1994): 11–13. http://dx.doi.org/10.1080/07366989409451331.
Full textFree, Clinton, Steven E. Salterio, and Teri Shearer. "The construction of auditability: MBA rankings and assurance in practice." Accounting, Organizations and Society 34, no. 1 (January 2009): 119–40. http://dx.doi.org/10.1016/j.aos.2008.02.003.
Full textSharma, Ravi S., Schubert Foo, and Miguel Morales-Arroyo. "Developing Corporate Taxonomies for Knowledge Auditability: A Framework for Good Practices." KNOWLEDGE ORGANIZATION 35, no. 1 (2008): 30–46. http://dx.doi.org/10.5771/0943-7444-2008-1-30.
Full textSelvaraj, Alagumani, and Subashini Sundararajan. "Survey on public auditability to ensure data integrity in cloud storage." International Journal of Computers and Applications 37, no. 3-4 (October 2, 2015): 102–10. http://dx.doi.org/10.1080/1206212x.2016.1188561.
Full textCanning, Mary, Brendan O’Dwyer, and George Georgakopoulos. "Processes of auditability in sustainability assurance – the case of materiality construction." Accounting and Business Research 49, no. 1 (May 8, 2018): 1–27. http://dx.doi.org/10.1080/00014788.2018.1442208.
Full textTong, Yue, Jinyuan Sun, Sherman S. M. Chow, and Pan Li. "Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability." IEEE Journal of Biomedical and Health Informatics 18, no. 2 (March 2014): 419–29. http://dx.doi.org/10.1109/jbhi.2013.2294932.
Full textJin, Hao, Ke Zhou, and Yan Luo. "A framework with data-centric accountability and auditability for cloud storage." Journal of Supercomputing 74, no. 11 (July 31, 2018): 5903–26. http://dx.doi.org/10.1007/s11227-018-2504-5.
Full textHettiarachchi, Nethmi, and G. A. P. P. R. Pathiraja. "Blockchain based Video Conferencing System with Enhanced Data Integrity Protection Auditability." International Journal of Computer Applications 183, no. 16 (July 19, 2021): 20–25. http://dx.doi.org/10.5120/ijca2021921490.
Full textWang, Qian, Cong Wang, Kui Ren, Wenjing Lou, and Jin Li. "Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing." IEEE Transactions on Parallel and Distributed Systems 22, no. 5 (May 2011): 847–59. http://dx.doi.org/10.1109/tpds.2010.183.
Full textRendon, Rene G., and Juanita M. Rendon. "Auditability in public procurement: an analysis of internal controls and fraud vulnerability." International Journal of Procurement Management 8, no. 6 (2015): 710. http://dx.doi.org/10.1504/ijpm.2015.072388.
Full textKuong, Javier. "Building Auditability into EDP Systems: Key Considerations in Making It a Success." EDPACS 16, no. 3 (September 1988): 6–13. http://dx.doi.org/10.1080/07366988809450511.
Full textPinheiro, Alexandre, Claudia Cappelli, and Cristiano Maciel. "Designing Auditability in Social Networks to Prevent the Spread of False Information." IEEE Latin America Transactions 15, no. 12 (December 2017): 2282–89. http://dx.doi.org/10.1109/tla.2017.8071089.
Full textDeng, Xudong, Chengliang Tian, Fei Chen, and Hequn Xian. "Designated-Verifier Anonymous Credential for Identity Management in Decentralized Systems." Mobile Information Systems 2021 (September 9, 2021): 1–15. http://dx.doi.org/10.1155/2021/2807395.
Full textTaminana, Shesagiri, Lalitha Bhaskari, Arwa Mashat, Dragan Pamučar, and Haritha Akkineni. "Secure Cloud Auditability for Virtual Machines by Adaptive Characterization Using Machine Learning Methods." Operational Research in Engineering Sciences: Theory and Applications 4, no. 3 (December 15, 2021): 59–75. http://dx.doi.org/10.31181/oresta20402059t.
Full textProsser, Alexander. "Transparency in eVoting." Transforming Government: People, Process and Policy 8, no. 2 (May 13, 2014): 171–84. http://dx.doi.org/10.1108/tg-09-2013-0032.
Full textJeacle, Ingrid. "Constructing audit society in the virtual world: the case of the online reviewer." Accounting, Auditing & Accountability Journal 30, no. 1 (January 16, 2017): 18–37. http://dx.doi.org/10.1108/aaaj-12-2013-1540.
Full textValluripally, Samaikya, Murugesan Raju, Prasad Calyam, Mauro Lemus, Soumya Purohit, Abu Mosa, and Trupti Joshi. "Increasing protected data accessibility for age-related cataract research using a semi-automated honest broker." Modeling and Artificial Intelligence in Ophthalmology 2, no. 3 (July 25, 2019): 115–32. http://dx.doi.org/10.35119/maio.v2i3.102.
Full textRendon, Juanita M., and Rene G. Rendon. "Procurement fraud in the US Department of Defense." Managerial Auditing Journal 31, no. 6/7 (June 6, 2016): 748–67. http://dx.doi.org/10.1108/maj-11-2015-1267.
Full textMcCrohon, Mark, and Ly Thi Tran. "Visualizing the Reality of Educational Research Participants Using an Amalgamation of Grounded and Positioning Theories." Higher Education for the Future 6, no. 2 (May 13, 2019): 141–57. http://dx.doi.org/10.1177/2347631119840532.
Full textHussain, Rasheed, Junggab Son, Donghyun Kim, Michele Nogueira, Heekuck Oh, Alade O. Tokuta, and Jungtaek Seo. "PBF: A New Privacy-Aware Billing Framework for Online Electric Vehicles with Bidirectional Auditability." Wireless Communications and Mobile Computing 2017 (2017): 1–17. http://dx.doi.org/10.1155/2017/5676030.
Full textSharma, Mohita Gangwar, and Sunil Kumar. "The Implication of Blockchain as a Disruptive Technology for Construction Industry." IIM Kozhikode Society & Management Review 9, no. 2 (July 2020): 177–88. http://dx.doi.org/10.1177/2277975220932343.
Full textMenzefricke, Ulrich, and Wally Smieliauskas. "Managerial Miscalibration and Its Effects on the Auditability of Accounting Estimates: Evidence from Pension Accounting." International Journal of Accounting 54, no. 04 (December 2019): 1950016. http://dx.doi.org/10.1142/s1094406019500161.
Full textDramé-Maigné, Sophie, Maryline Laurent, Laurent Castillo, and Hervé Ganem. "Centralized, Distributed, and Everything in between." ACM Computing Surveys 54, no. 7 (September 30, 2022): 1–34. http://dx.doi.org/10.1145/3465170.
Full textA.O., Ayokunle, Martin E., Ernest E.O., Izang A., Ajayi W., and Adekola O. "Automated Teller Machine-Based Voting System." British Journal of Computer, Networking and Information Technology 4, no. 2 (September 22, 2021): 31–41. http://dx.doi.org/10.52589/bjcnit-bpp3ly55.
Full textAdhau, Bhagyashri H. "Transfer of Secret Data using Re-encryption Technique with Hyperledger Fabric based on Blockchain Technology." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 30, 2021): 3582–88. http://dx.doi.org/10.22214/ijraset.2021.35725.
Full textKaramachoski, Jovan, Ninoslav Marina, and Pavel Taskov. "Blockchain-Based Application for Certification Management." Tehnički glasnik 14, no. 4 (December 9, 2020): 488–92. http://dx.doi.org/10.31803/tg-20200811113729.
Full textGilje, Fredricka, and Anne-Grethe Talseth. "Mediating Consolation With Suicidal Patients." Nursing Ethics 14, no. 4 (July 2007): 546–57. http://dx.doi.org/10.1177/0969733007077889.
Full textAu, Cheuk Hang, and Walter S. L. Fung. "Integrating Knowledge Management into Information Security." International Journal of Knowledge Management 15, no. 1 (January 2019): 37–52. http://dx.doi.org/10.4018/ijkm.2019010103.
Full textRen, Yongjun, Fujian Zhu, Jian Qi, Jin Wang, and Arun Kumar Sangaiah. "Identity Management and Access Control Based on Blockchain under Edge Computing for the Industrial Internet of Things." Applied Sciences 9, no. 10 (May 18, 2019): 2058. http://dx.doi.org/10.3390/app9102058.
Full textGrontas, Panagiotis, Aris Pagourtzis, Alexandros Zacharakis, and Bingsheng Zhang. "Publicly auditable conditional blind signatures." Journal of Computer Security 29, no. 2 (March 29, 2021): 229–71. http://dx.doi.org/10.3233/jcs-181270.
Full textElmogazy, Huda, and Omaimah Bamasag. "Securing Healthcare Records in the Cloud Using Attribute-Based Encryption." Computer and Information Science 9, no. 4 (November 2, 2016): 60. http://dx.doi.org/10.5539/cis.v9n4p60.
Full textSaa, Olivia, and Julio Michael Stern. "Auditable Blockchain Randomization Tool." Proceedings 33, no. 1 (December 2, 2019): 17. http://dx.doi.org/10.3390/proceedings2019033017.
Full textArabas, Sylwester, Dorota Jarecka, Anna Jaruga, and Maciej Fijałkowski. "Formula Translation in Blitz++, NumPy and Modern Fortran: A Case Study of the Language Choice Tradeoffs." Scientific Programming 22, no. 3 (2014): 201–22. http://dx.doi.org/10.1155/2014/870146.
Full text