Academic literature on the topic 'Computer Auditing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer Auditing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Computer Auditing"
Williams, Paul. "Auditing Computer Security." Computer Fraud & Security Bulletin 1990, no. 5 (May 1990): 19. http://dx.doi.org/10.1016/0142-0496(90)90057-r.
Full textRawling, Alan K. "Computer-Aided Report Auditing." Drug Information Journal 28, no. 1 (January 1994): 331–38. http://dx.doi.org/10.1177/009286159402800143.
Full textCerullo, Michael J. "A computer auditing course." Computers & Education 10, no. 2 (January 1986): 273–79. http://dx.doi.org/10.1016/0360-1315(86)90028-x.
Full textSmith, Gordon. "Auditing Computer Contracts: An Ignored Science." EDPACS 16, no. 4 (October 1988): 8–11. http://dx.doi.org/10.1080/07366988809450518.
Full textdu Plessis, R., and P. M. Q. Lay. "A framework for computer auditing research." De Ratione 3, no. 1 (January 1989): 8–19. http://dx.doi.org/10.1080/10108270.1989.11435002.
Full textTiedemann, Dale M. "Auditing Using Personal Computers." EDPACS 15, no. 5 (November 1987): 7–9. http://dx.doi.org/10.1080/07366988709450448.
Full textJones, Douglas W. "Auditing elections." Communications of the ACM 47, no. 10 (October 2004): 46–50. http://dx.doi.org/10.1145/1022594.1022622.
Full textRezaee, Zabihollah, Ahmad Sharbatoghlie, Rick Elam, and Peter L. McMickle. "Continuous Auditing: Building Automated Auditing Capability." AUDITING: A Journal of Practice & Theory 21, no. 1 (March 1, 2002): 147–63. http://dx.doi.org/10.2308/aud.2002.21.1.147.
Full textIyengar, Vijay S., Keith B. Hermiz, and Ramesh Natarajan. "Computer-aided auditing of prescription drug claims." Health Care Management Science 17, no. 3 (July 3, 2013): 203–14. http://dx.doi.org/10.1007/s10729-013-9247-x.
Full textLau, Jeremy, Matthew Arnold, Michael Hind, and Brad Calder. "Online performance auditing." ACM SIGPLAN Notices 41, no. 6 (June 11, 2006): 239–51. http://dx.doi.org/10.1145/1133255.1134010.
Full textDissertations / Theses on the topic "Computer Auditing"
Ching, Siu-ming Vincent. "Computer auditing in Hong Kong /." [Hong Kong : University of Hong Kong], 1986. http://sunzi.lib.hku.hk/hkuto/record.jsp?B12325764.
Full textChing, Siu-ming Vincent, and 程少明. "Computer auditing in Hong Kong." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1986. http://hub.hku.hk/bib/B31263550.
Full textSridhar, Mayuri. "Optimizations for election tabulation auditing." Thesis, Massachusetts Institute of Technology, 2019. https://hdl.handle.net/1721.1/121684.
Full textThesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2019
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 129-131).
In this thesis, we explore different techniques to improve the field of election tabulation audits. In particular, we start by discussing the open problems in statistical election tabulation audits and categorizing these problems into three main sections - audit correctness, flexibility, and efficiency. In our first project, we argue that Bayesian audits provide a more flexible framework for a variety of elections than RLAs. Thus, we initially focus on analyzing their statistical soundness. Furthermore, we design and implement optimization techniques for Bayesian audits which show an increase in efficiency on synthetic election data. Then, motivated by empirical feedback from audit teams, we focus on workload estimation for RLAs. That is, we note that audit teams often want to finish the audit in a single round even if it requires sampling a few additional ballots. Hence, for the second project, we design software tools which can make initial sample size recommendations with this in mind. For our largest project, we focus on approximate sampling. That is, we argue that approximate sampling would provide an increase in efficiency for RLAs and suggest a particular sampling scheme, k-cut. We explore the usability of k-cut by providing and analyzing empirical data on single cuts. We argue that for large k, the model will converge to the uniform distribution exponentially quickly. We discuss simple mitigation procedures to make any statistical procedure work with approximate sampling and provide guidance on how to choose k. We also discuss usage of k-cut in practice, from pilot audit experiences in Indiana and Michigan, which showed that k-cut led to a significant real-life increase in efficiency.
Supported by Center for Science of Information (CSoI), an NSF Science and Technology Centergrant agreement CCF-0939370
by Mayuri Sridhar.
M. Eng.
M.Eng. Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science
Leung, Chung-pak. "Concurrent auditing on computerized accounting systems /." Hong Kong : University of Hong Kong, 1998. http://sunzi.lib.hku.hk/hkuto/record.jsp?B19872501.
Full textNagle, Liam. "Development of a Computer Based Energy Management System." Thesis, Cranfield University, 1998. http://dspace.lib.cranfield.ac.uk/handle/1826/4662.
Full textCohen, Sharon B. "Auditing technology for electronic voting machines." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/33119.
Full textIncludes bibliographical references (leaf 63).
Direct Recording Electronic (DRE) voting machine security has been a significant topic of contention ever since Diebold voting machine code turned up on a public Internet site in 2003 and computer scientists at Johns Hopkins University declared the machine "unsuitable for use in a general election." Since then, many people from computer scientists to politicians have begun to insist that DREs be equipped with a paper trail. A paper trail provides a paper printout for the voter to approve at the end of each voting session. Although there have been strong political efforts to place paper trails on DRE machines, there have not been any scientific studies to indicate that paper trails are effective audits. This work describes a user study done to compare paper trails to audio audits, a new proposal for DRE auditing. Participants in the study completed four elections on a voting machine with a paper trail and four elections on a machine with an audio trail. There were purposeful mistakes inserted into the audits on some of the machines. Results from the study indicated that participants were able to find almost 10 times as many errors in the audio audit then they were able to find in the paper trail. Voters' attitudes towards the paper audit were extremely apathetic, and voters did not spend much time reviewing their paper record. When asked which type of audit voters would prefer for their own county elections, almost all voters preferred the VVPAT. These results indicate that newer alternative audit technology holds great promise in delivering a safe and accurate audit and further that paper trails have some significant design obstacles that need to be overcome before they will be effective audits.
by Sharon B. Cohen.
M.Eng.and S.B.
梁松柏 and Chung-pak Leung. "Concurrent auditing on computerized accounting systems." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1998. http://hub.hku.hk/bib/B31269011.
Full textBrazel, Joseph F. Agoglia Chris. "The effects of computer assurance specialist competence and auditor accounting information system expertise on auditor planning judgments /." Philadelphia, Pa. : Drexel University, 2004. http://dspace.library.drexel.edu/handle/1860/293.
Full textAldeco, Perez Rocio. "Secure provenance-based auditing of personal data use." Thesis, University of Southampton, 2012. https://eprints.soton.ac.uk/340065/.
Full textPinthuprapa, Chatchai. "The development and adaptation of the computer aided environment to facilitate industrial energy audits." Diss., Columbia, Mo. : University of Missouri-Columbia, 2007. http://hdl.handle.net/10355/5093.
Full textThe entire dissertation/thesis text is included in the research.pdf file; the official abstract appears in the short.pdf file (which also appears in the research.pdf); a non-technical general description, or public abstract, appears in the public.pdf file. Title from title screen of research.pdf file (viewed on April 7, 2008) Includes bibliographical references.
Books on the topic "Computer Auditing"
Krist, Martin A. A standard for auditing computer applications: Auditing implemented applications. Boca Raton: Auerbach, 1998.
Find full textPerry, William E. A standard for auditing computer applications: Auditing systems requirements. Boston: Auerbach, 1995.
Find full textPerry, William E. A standard for auditing computer applications: Auditing client/server systems. Boston: Auerbach, 1994.
Find full textPerry, William E. A standard for auditing computer applications: Auditing information services defects. Boston: Auerbach, 1996.
Find full textPerry, William E. A standard for auditing computer applications: Auditing client/server systems. Boston: Auerbach, 1994.
Find full textRuss, Rogers, Criscuolo Paul, and Petruzzi Mike, eds. Nessus network auditing. 2nd ed. Burlington, MA: Syngress, 2008.
Find full textControlling and auditing small computer systems. [Toronto]: Canadian Institute of Chartered Accountants, 1986.
Find full textBook chapters on the topic "Computer Auditing"
Weik, Martin H. "auditing." In Computer Science and Communications Dictionary, 77. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_1027.
Full textMalvestuto, Francesco M., and Mauro Mezzini. "Auditing Sum Queries." In Lecture Notes in Computer Science, 126–42. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-36285-1_9.
Full textBlom, Michelle, Philip B. Stark, Peter J. Stuckey, Vanessa Teague, and Damjan Vukcevic. "Auditing Hamiltonian Elections." In Lecture Notes in Computer Science, 235–50. Berlin, Heidelberg: Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-662-63958-0_21.
Full textRiedl, Reinhard, and Manuel Juen. "IT Auditing in E-Government." In Lecture Notes in Computer Science, 341–52. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11823100_30.
Full textKamal, Sara, Iman M. A. Helal, Sherif A. Mazen, and Sherif Elhennawy. "Computer-Assisted Audit Tools for IS Auditing." In Internet of Things—Applications and Future, 139–55. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-3075-3_10.
Full text"Computer Security and Auditing." In Information Systems and Technology for the Noninformation Systems Executive. CRC Press, 2000. http://dx.doi.org/10.1201/9781420025651.ch17.
Full text"Auditing the Midrange Computer." In Standard for Auditing Computer Applications. Auerbach Publications, 1998. http://dx.doi.org/10.1201/noe0849399831.sec13.
Full text"COMPUTERS AND COMPUTER CONTROLLED SYSTEMS." In Laboratory Auditing for Quality and Regulatory Compliance, 173–75. CRC Press, 2005. http://dx.doi.org/10.1201/b14268-38.
Full text"Computer Crime." In Fraud Auditing and Forensic Accounting, 175–94. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2011. http://dx.doi.org/10.1002/9781118269183.ch9.
Full text"Computer File Survey." In Standard for Auditing Computer Applications. Auerbach Publications, 1998. http://dx.doi.org/10.1201/noe0849399831.ax35.
Full textConference papers on the topic "Computer Auditing"
Ying Wah, The, Mustaffa Kamal Nor, Zaitun Abu Bakar, and Lee Sai Peck. "Data Mining in Computer Auditing." In 2002 Informing Science + IT Education Conference. Informing Science Institute, 2002. http://dx.doi.org/10.28945/2586.
Full textAhn, Eui-San, and Gyu An Lee. "Auditing Techniques using Digital Forensic." In Next Generation Computer and Information Technology 2017. Science & Engineering Research Support soCiety, 2017. http://dx.doi.org/10.14257/astl.2017.145.15.
Full textLiu, Lianzhong, and Qiang Huang. "A Framework for Database Auditing." In 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology. IEEE, 2009. http://dx.doi.org/10.1109/iccit.2009.207.
Full textAldeco-Pérez, Rocío, and Luc Moreau. "Provenance-based Auditing of Private Data Use." In Visions of Computer Science - BCS International Academic Conference. BCS Learning & Development, 2008. http://dx.doi.org/10.14236/ewic/vocs2008.13.
Full textPatil, Tejashri A., Latesh S. Mahajan, and Ashish T. Bhole. "Public Auditing Algorithm for Encrypted Data." In 2017 International Conference on Current Trends in Computer, Electrical, Electronics and Communication (CTCEEC). IEEE, 2017. http://dx.doi.org/10.1109/ctceec.2017.8455105.
Full textFurlani, Thomas R., Gregor von Laszewski, Lizhe Wang, Ann Zimmerman, Matthew D. Jones, Steven M. Gallo, Andrew E. Bruno, et al. "Performance metrics and auditing framework for high performance computer systems." In the 2011 TeraGrid Conference. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2016741.2016759.
Full textGolyash, Iryna, and Igor Golyash. "Issues regarding implementation of computer information technologies into auditing practices." In 2009 IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS). IEEE, 2009. http://dx.doi.org/10.1109/idaacs.2009.5342908.
Full textMohamed, Intan Salwani, Nur Husniah Muhammad Muhayyidin, and Nabilah Rozzani. "Auditing and Data Analytics Via Computer Assisted Audit Techniques (CAATS)." In the 3rd International Conference. New York, New York, USA: ACM Press, 2019. http://dx.doi.org/10.1145/3361758.3361773.
Full textCong, Qiushi, Zuoming Huang, and Jibing Hu. "A collaborative computer auditing system under SOA-based conceptual model." In Fifth International Conference on Machine Vision (ICMV 12), edited by Yulin Wang, Liansheng Tan, and Jianhong Zhou. SPIE, 2013. http://dx.doi.org/10.1117/12.2021009.
Full textDash, Abhisek, Animesh Mukherjee, and Saptarshi Ghosh. "A Network-centric Framework for Auditing Recommendation Systems." In IEEE INFOCOM 2019 - IEEE Conference on Computer Communications. IEEE, 2019. http://dx.doi.org/10.1109/infocom.2019.8737486.
Full text