Academic literature on the topic 'Electronic data processing – Auditing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Electronic data processing – Auditing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Electronic data processing – Auditing"

1

Pîrvuţ, Valentin. "Auditing of the Computerised Information Systems in the Military Organization." Scientific Bulletin 21, no. 1 (June 1, 2016): 36–39. http://dx.doi.org/10.1515/bsaft-2016-0034.

Full text
Abstract:
Abstract An internal public auditing mission is a complex process with multiple objectives and auditable objects, which offers a most complete management of the audited entity’s identified risks and proposes solutions and recommendations for limiting their impact. In the informatics segment, the calculators, informatics systems (the operation systems, the informatics applications used in the entity, the accounting management systems of the data bases), the communication networks, the procedures and operations adjacent to the informatics systems, the policies in the system are subjected to control and evaluation. To this end, due to the importance the use of the calculator grants within the entities, in some countries there have been elaborated several normative acts regulating the use, control and auditing of the electronic devices used for processing the data. Thus, the most important regulations referring to the auditing within the computerized information systems (CIS - Computerized Information Systems) are the ISA ( International Standards on Auditing) and IAPS ( International Auditing Practice Statement) standards elaborated by IFAC ( International Federation of Accountants).
APA, Harvard, Vancouver, ISO, and other styles
2

Cao, Xinyue, Zhangjie Fu, and Xingming Sun. "A Privacy-Preserving Outsourcing Data Storage Scheme with Fragile Digital Watermarking-Based Data Auditing." Journal of Electrical and Computer Engineering 2016 (2016): 1–7. http://dx.doi.org/10.1155/2016/3219042.

Full text
Abstract:
Cloud storage has been recognized as the popular solution to solve the problems of the rising storage costs of IT enterprises for users. However, outsourcing data to the cloud service providers (CSPs) may leak some sensitive privacy information, as the data is out of user’s control. So how to ensure the integrity and privacy of outsourced data has become a big challenge. Encryption and data auditing provide a solution toward the challenge. In this paper, we propose a privacy-preserving and auditing-supporting outsourcing data storage scheme by using encryption and digital watermarking. Logistic map-based chaotic cryptography algorithm is used to preserve the privacy of outsourcing data, which has a fast operation speed and a good effect of encryption. Local histogram shifting digital watermark algorithm is used to protect the data integrity which has high payload and makes the original image restored losslessly if the data is verified to be integrated. Experiments show that our scheme is secure and feasible.
APA, Harvard, Vancouver, ISO, and other styles
3

Appelbaum, Deniz, and Robert A. Nehmer. "Auditing Cloud-Based Blockchain Accounting Systems." Journal of Information Systems 34, no. 2 (October 25, 2019): 5–21. http://dx.doi.org/10.2308/isys-52660.

Full text
Abstract:
ABSTRACT In this research, we often refer to Nakamoto's (2008) seminal paper, “Bitcoin: A Peer-to-Peer Electronic Cash System,” to consider his proposed abstracted characteristics and how auditors could look at companies' transactions interfacing to a private/semi-private blockchain with Nakamoto's general characteristics and address the related audit domain for such transactions. We then take these design requirements for auditors and, using design science research (DSR), we consider the transaction processing and contracting contexts that match those requirements in permissioned blockchains.The blockchains discussed in this paper would typically be business-to-business or business-to-consumer, private or semi-private, and residing in either a private, semi-private, or public cloud. Those blockchains will each have their own design and operational procedures, including validation procedures (the miners). We consider the audit issues of data reliability, data security, and transaction transparency in accounting transactions that lend themselves to a permissioned blockchain as well as other contextual issues.
APA, Harvard, Vancouver, ISO, and other styles
4

Liu, Kangying. "IT Audit of Cloud Accounting Platform Based on Big Data." Journal of Physics: Conference Series 2066, no. 1 (November 1, 2021): 012024. http://dx.doi.org/10.1088/1742-6596/2066/1/012024.

Full text
Abstract:
Abstract So far, the level of science and technology in China has experienced unprecedented development, at the same time, the computer level of our country has improved significantly. At present, more and more Big data technologies are gradually entering the field of vision of people, in most industries of our country they are dedicated to the research and application of big data technology. Big data, these can provide people with more and more reliable information.At the same time, it also brings great convenience to people’s daily life and brings creativity to enterprises.With the development of the times and the progress of science and technology, the application of modern computer technology can achieve the digitization of information technology audit. That is, the audit project data ion of digital IT are kept and stored according to actual needs. According to the relationship between different electronic documents, link and combine them to improve the efficiency of IT audit and minimize audit costs. In recent years, Our country’s informatization process has become deeper and deeper, which has brought great convenience to all walks of life. In traditional IT auditing, it has been unable to meet the current development needs. This requires redesigning IT auditing thinking, establishing a new framework, and creating digital IT auditing to meet the needs of the times and improve IT auditing efficiency. In this article, we will study all kinds of data in the digital IT audit project, and we will discuss the application audit of the cloud-based computing platform.Big Data, mainly the audit of cloud computing platform data, and whether it is effective in the input, processing and output process, in order to achieve the effect of high speed and high quality.Finally, summarize the research results.The efficiency of IT verification has improved significantly.
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, Zhenpeng, Shuo Wang, Sichen Duan, Lele Ren, and Jianhang Wei. "Dynamic Data Integrity Auditing Based on Hierarchical Merkle Hash Tree in Cloud Storage." Electronics 12, no. 3 (February 1, 2023): 717. http://dx.doi.org/10.3390/electronics12030717.

Full text
Abstract:
In cloud storage mode, users lose physical control over their data. To enhance the security of outsourced data, it is vital to audit the data integrity of the data owners. However, most of the current audit protocols have a single application scenario and cannot accommodate the actual needs of individuals and enterprises. In this research, a safe and efficient auditing scheme is proposed that is based on a hierarchical Merkle tree. On the one hand, we use a hierarchical authentication data structure and local signature aggregation technique to reduce the scale of the Merkle tree. In addition, authoritative nodes are introduced to reduce the length of the authentication path and improve the update efficiency. On the other hand, we introduce a monitoring mechanism that is based on the original data integrity auditing model to analyze the cloud data, which improves the transparency and credibility of cloud service providers. In addition, we achieve incomplete data recovery through log analysis, which greatly reduces the number of replicas of files under the premise of multi-copy auditing, reduces the burden on cloud service providers, and improves the fairness of audit protocols. The theoretical analysis and experimental comparison prove that the method is secure and efficient. It can effectively reduce the computational overhead and storage overhead in integrity auditing.
APA, Harvard, Vancouver, ISO, and other styles
6

Bian, Genqing, Xusen Guo, Rong Li, Wenjing Qu, and Yu Zhao. "Certificateless Data Integrity Auditing in Cloud Storage with a Designated Verifier and User Privacy Preservation." Electronics 11, no. 23 (November 25, 2022): 3901. http://dx.doi.org/10.3390/electronics11233901.

Full text
Abstract:
With the rapid development of science and technology, enterprises will provide their customers with cloud data storage services. These massive amounts of data bring huge management costs to enterprises. Therefore, enterprises choose to store their data in professional cloud service providers and have third-party auditors check the integrity of cloud data to ensure security. Although the appearance of auditors reduces the enormous calculation pressure on enterprises, if the number of auditors is not limited, it will also bring an expensive management burden to enterprises. At the same time, in the process of performing data integrity auditing on behalf of the enterprise, auditors may be interested in some sensitive information of the enterprise’s customers (such as customer’s identity and specific content of customer data). Therefore, this paper proposes a remote data integrity auditing scheme based on designated verifiers. An essential feature of the scheme is that the auditor cannot obtain any customer’s identity information and data in the process of auditing; data integrity, the anonymity of the user’s identity, and data privacy are maintained in the process of auditing. Both theoretical analysis and experimental results show that our scheme is efficient and feasible.
APA, Harvard, Vancouver, ISO, and other styles
7

Khlaponin, Yuriy, Volodymyr Vyshniakov, Viktoriia Ternavska, Oleksandr Selyukov, and Oleg Komarnytskyi. "Development of audit and data protection principles in electronic voting systems." Eastern-European Journal of Enterprise Technologies 4, no. 2(112) (August 31, 2021): 47–57. http://dx.doi.org/10.15587/1729-4061.2021.238259.

Full text
Abstract:
It is assumed in standard information protection technologies that there are owners of this information who put forward requirements for protection. In secret voting systems, the information belongs to the community of citizens, and to protect it, vote organizers must create conditions that allow each voter to make sure that the vote secrecy and accuracy of vote counting are preserved. In developed democracies, this issue is resolved through a widely available audit of all procedures that may be mistrusted. Any voter can conduct such an audit. The anxiety of citizens of democratic countries is based on the idea that if electronic voting is introduced, it will be impossible to conduct such an audit. The article proposes principles of auditing all those software and hardware tools and processes of the online voting system that can generate voter distrust. This audit is carried out using a dedicated server open to voters and their fiduciaries. This server provides continuous monitoring of actions of the service staff in terms of possible interference in the operation of the voting system. Also, due to this server, auditors receive data on the integrity of the voting system hardware and software including its audit tools and an alarm signal in the event of a threat. It was possible to reduce the average time of processing the voter requests to two seconds. This means that processing a maximum of 2,500 voter requests at a vote station will take no more than two hours. Simultaneous access of 50 voters to the server will not make them wait in the queue for more than 2 minutes. Implementation results were described and links were given for conducting experimental voting on the Internet.
APA, Harvard, Vancouver, ISO, and other styles
8

Mane, Prashant Mininath, and C. M. Sheela Rani. "Achieving Confidentiality and Effective Access Control of Cloud Data Using Cipher Text Policy Based Attribute Based Encryption." Journal of Computational and Theoretical Nanoscience 16, no. 12 (December 1, 2019): 5063–66. http://dx.doi.org/10.1166/jctn.2019.8564.

Full text
Abstract:
Today’s era most of the data required for large businesses are stored on cloud. Cloud systems have number of advantages such as it provides space for store large amount of data and shared resources for processing the stored data. Security of the files stored on the cloud is one of the major problems of cloud system. Because data stored on cloud may leaks to unauthorized user or cloud system itself can modify the data or delete the data. So mainly whatever the data stored on cloud by the owner is retrieved by the users who have the permission to access the data which provides the superior access control to the data. Also need to make provision that the data cannot be accessed by cloud itself that is we need to provide integrity auditing of data. This work proposes cipher text-policy ABE scheme with integrity auditing to provide excellent access control and confidentiality of data.
APA, Harvard, Vancouver, ISO, and other styles
9

Aleliūnas, Irmantas, and Zenona Atkočiūnienė. "Informacijos auditas kitų audito rūšių kontekste." Informacijos mokslai 54 (January 1, 2010): 7–16. http://dx.doi.org/10.15388/im.2010.0.3178.

Full text
Abstract:
Mokslininkai, analizuodami informacijos auditą, pažymi šio audito svarbą ir įvairius jo aspektus, tačiau praktinėje veikloje informacijos auditas neįsitvirtinęs. Informacijos auditas dar neturi parengtų standartų ir metodikų bei labiau panašus į mokslinę veiklą. Siekiant sukurti pagrindą legitimiai bazei, straipsnyje yra atliekamas informacijos audito pozicionavimas bendroje audito aplinkoje. Tyrimo metu įvertinamos audito rūšys, jos struktūrizuojamos ir atliekama informacijos audito bei kitų audito rūšių lyginamoji analizė pagal funkcinį ir kitus požymius.Pagrindiniai žodžiai: informacijos auditas, duomenų (informacinių sistemų) auditas, veiklos auditas, atitikimo (teisėtumo) auditas, informacijos valdymas, auditorių nepriklausomumasInformation Audit in the Context of Other Audit TypesIrmantas Aleliūnas, Zenona Atkočiūnienė Summary Information auditing requires globally applicable standards that pertain specifically to information auditing. Globally applicable standards are known in financial, performance, information systems (electronic data processing) and other types of audits. However, information audit is rather scientific than practical activity – information audit standards are not agreed yet, therefore:• minimum level of acceptable performance required to meet the professional responsibilities is not yet set out • Stakeholders and shareholders have no information concerning the work of information auditing practitionersThese problems incited the purpose of the research – to analyse relationships between information audit and other audit types and to find a basis for the concepts and standards of information audit.;
APA, Harvard, Vancouver, ISO, and other styles
10

Sim, Sung-Ho, and Yoon-Su Jeong. "Multi-Blockchain-Based IoT Data Processing Techniques to Ensure the Integrity of IoT Data in AIoT Edge Computing Environments." Sensors 21, no. 10 (May 18, 2021): 3515. http://dx.doi.org/10.3390/s21103515.

Full text
Abstract:
As the development of IoT technologies has progressed rapidly recently, most IoT data are focused on monitoring and control to process IoT data, but the cost of collecting and linking various IoT data increases, requiring the ability to proactively integrate and analyze collected IoT data so that cloud servers (data centers) can process smartly. In this paper, we propose a blockchain-based IoT big data integrity verification technique to ensure the safety of the Third Party Auditor (TPA), which has a role in auditing the integrity of AIoT data. The proposed technique aims to minimize IoT information loss by multiple blockchain groupings of information and signature keys from IoT devices. The proposed technique allows IoT information to be effectively guaranteed the integrity of AIoT data by linking hash values designated as arbitrary, constant-size blocks with previous blocks in hierarchical chains. The proposed technique performs synchronization using location information between the central server and IoT devices to manage the cost of the integrity of IoT information at low cost. In order to easily control a large number of locations of IoT devices, we perform cross-distributed and blockchain linkage processing under constant rules to improve the load and throughput generated by IoT devices.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Electronic data processing – Auditing"

1

Wheeler, Sonya. "A structured technique for applying risk based internal auditing in information technology environments : (with specific reference to llA RBIA, King Report and CobiT) /." Link to the online version, 2005. http://hdl.handle.net/10019/1310.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Anyanwu, Ogechi Uloma. "The role of enterprise resource planning systems in continuous auditing of a selected organization in the Western Cape, South Africa." Thesis, Cape Peninsula University of Technology, 2018. http://hdl.handle.net/20.500.11838/2669.

Full text
Abstract:
Thesis (MTech (Business Information Systems))--Cape Peninsula University of Technology, 2018.
The thesis aimed at exploring the role Enterprise Resource Planning (ERP) Systems play in an organization’s continuous auditing practices. Continuous auditing encourages innovation and improves the practice of traditional auditing through the use of automation and computerisation. Auditing specialists and researchers have begun to adopt a technology driven process as an approach to back up real time assurance. The rationale of the study is drawn from previous research where the findings argue that organizations employ the use of ERP systems because it enables seamless access to information and automation, which makes monitoring of controls easier. The study used Structuration Theory (ST) as the underpinning theory and drew on the concept of duality of technology (i.e., Enactment of Technology-in-Practice) as a lens to comprehend and deduced the social phenomenon of continuous auditing using ERP system. This research study investigated this social phenomenon and how it had influenced performance auditing of an organization. The study applied interpretivism as a research paradigm and as such adopted a qualitative approach where semi-structured interviews were used to tease out the research objectives and questions. The outcome of the research validated a conceptual framework which has led to a proposed general framework for practicing continuous auditing using ERP system. All interviews data collected and accurately captured with informed consent were subject to the approval of the selected organization. This was not to violate the organization’s privacy and confidentiality policies. It did not reveal any information that could potentially adversely affect the reputation of the organization or reveal private information to its competitors.
APA, Harvard, Vancouver, ISO, and other styles
3

Mashima, Daisuke. "Safeguarding health data with enhanced accountability and patient awareness." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/45775.

Full text
Abstract:
Several factors are driving the transition from paper-based health records to electronic health record systems. In the United States, the adoption rate of electronic health record systems significantly increased after "Meaningful Use" incentive program was started in 2009. While increased use of electronic health record systems could improve the efficiency and quality of healthcare services, it can also lead to a number of security and privacy issues, such as identity theft and healthcare fraud. Such incidents could have negative impact on trustworthiness of electronic health record technology itself and thereby could limit its benefits. In this dissertation, we tackle three challenges that we believe are important to improve the security and privacy in electronic health record systems. Our approach is based on an analysis of real-world incidents, namely theft and misuse of patient identity, unauthorized usage and update of electronic health records, and threats from insiders in healthcare organizations. Our contributions include design and development of a user-centric monitoring agent system that works on behalf of a patient (i.e., an end user) and securely monitors usage of the patient's identity credentials as well as access to her electronic health records. Such a monitoring agent can enhance patient's awareness and control and improve accountability for health records even in a distributed, multi-domain environment, which is typical in an e-healthcare setting. This will reduce the risk and loss caused by misuse of stolen data. In addition to the solution from a patient's perspective, we also propose a secure system architecture that can be used in healthcare organizations to enable robust auditing and management over client devices. This helps us further enhance patients' confidence in secure use of their health data.
APA, Harvard, Vancouver, ISO, and other styles
4

梁松柏 and Chung-pak Leung. "Concurrent auditing on computerized accounting systems." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1998. http://hub.hku.hk/bib/B31269011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Blundell, Adrian Wesley. "Continuous auditing technologies and models." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/476.

Full text
Abstract:
Continuous auditing is not a totally new concept, but it has not been widely implemented, and has existed mostly as a point of debate amongst the auditing fraternity. This may soon change, as continuous auditing has become a topic of great interest, especially in the last decade. This may be due to a combination of reasons. In the last decade, much of the confidence in auditors’ reports was lost due to corporate governance scandals. This also brought about a greater desire for faster, more reliable reporting on which to base decisions. This desire has been transposed into regulations such as the Sarbanes-Oxley act in the United States, which encourages real-time auditing activities, which would benefit from continuous auditing. A second, possible contributing factor to the heightened interest in continuous auditing is that much of the requisite technology has matured to a point where it can be successfully used to implement continuous auditing. It is the technologies which form the focus of this research. It is therefore, the primary objective of this research to investigate and identify the essential technologies, and identify and define their roles within a continuous auditing solution. To explore this area, three models of continuous auditing are compared according to the roles of the technologies within them. The roots of some auditing technologies which can be adapted to the paradigm of continuous auditing are explored, as well as new technologies, such as XML-based reporting languages. In order to fully explore these technologies, the concepts of data integrity and data quality are first defined and discussed, and some security measures which contribute to integrity are identified. An obstacle to implementing a continuous model is that even with the newly available technologies, the multitudes of systems which are used in organisations, produce data in a plethora of data formats. In performing an audit the continuous auditing system needs to first gather this data and then needs to be able to compare “apples with apples”. Therefore, the technologies which can be used to acquire and standardise the data are identified.
APA, Harvard, Vancouver, ISO, and other styles
6

Ching, Siu-ming Vincent, and 程少明. "Computer auditing in Hong Kong." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1986. http://hub.hku.hk/bib/B31263550.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Aldeco, Perez Rocio. "Secure provenance-based auditing of personal data use." Thesis, University of Southampton, 2012. https://eprints.soton.ac.uk/340065/.

Full text
Abstract:
In recent years, an increasing number of personalised services that require users to disclose personal information have appeared on the Web (e.g. social networks, governmental sites, on-line selling sites). By disclosing their personal information, users are given access to a wide range of new functionality and benefits. However, there exists a risk that their personal information is misused. To strike a balance between the advantages of personal information disclosure and protection of information, governments have created legal frameworks, such as the Data Protection Act, Health Insurance Portability & Accountability Act (HIPAA) or Safe Harbor, which place restrictions on how organisations can process personal information. By auditing the way in which organisations used personal data, it is possible to determine whether they process personal information in accordance with the appropriate frameworks. The traditional way of auditing collects evidence in a manual way. This evidence is later analysed to assess the degree of compliance to a predefined legal framework. These manual assessments are long, since large amounts of data need to be analysed, and they are unreliable, since there is no guarantee that all data is correctly analysed. As several cases of data leaks and exposures of private data have proven, traditional audits are also prone to intentional and unintentional errors derived from human intervention. Therefore, this thesis proposes a provenance-based approach to auditing the use of personal information by securely gathering and analysing electronic evidence related to the processing of personal information. This approach makes three contributions to the state of art. The first contribution is the Provenance-based Auditing Architecture that defies a set of communication protocols to make existing systems provenance-aware. These protocols specify which provenance information should be gathered to verify the compliance with the Data Protection Act. Moreover, we derive a set of Auditing Requirements by analysing a Data Protection Act case study and demonstrate that provenance can be used as electronic evidence of past processing. The second contribution is the Compliance Framework, which is a provenance-based auditing framework for automatically auditing the compliance with the Data Protection Act's principles. This framework consist of a provenance graph representation (Processing View), a novel graph-based rule representation expressing processing rules (Usage Rules Definition) and a novel set of algorithms that automatically verify whether information was processed according to the Auditing Requirements by comparing the Processing View against the Usage Rules Definition. The third contribution is the Secure Provenance-based Auditing Architecture that ensures any malicious alteration on provenance during the entire provenance life cycle of recording, storage, querying and analysis can be detected. This architecture, which relies on cryptographic techniques, guarantees the correctness of the audit results
APA, Harvard, Vancouver, ISO, and other styles
8

Marshall, Thomas E. (Thomas Edward) 1954. "Task Domain Knowledge as a Moderator of Information System Usage." Thesis, University of North Texas, 1993. https://digital.library.unt.edu/ark:/67531/metadc278541/.

Full text
Abstract:
Information system (IS) support of human problem solving during the complex task of auditing within a computer environment was investigated. 74 computer audit specialist professionals from nine firms participated in the field experiment. Task accomplishment behavior was recorded via a computerized activity-logging technique. Theoretical constructs of interest included: 1) IS problem-solving support, 2) task domain knowledge, and 3) decision-making behavior. It was theorized that task domain knowledge influences the type of IS most functionally appropriate for usage by that individual. IS task presentation served as the treatment variable. Task domain knowledge was investigated as a moderating factor of task accomplishment Task accomplishment, the dependent variable, was defined as search control strategy and quality of task performance. A subject's task domain knowledge was assessed over seven theoretical domains. Subjects were assigned to higher or lower task domain knowledge groups based on performance on professional competency examination questions. Research hypothesis one investigated the effects of task domain knowledge on task accomplishment behavior. Several task domain knowledge bases were found to influence both search control strategy and task performance. Task presentation ordering effects, hypothesis two, were not found to significantly influence search control strategy or task performance. The third hypothesis investigated interaction effects of a subject's task domain knowledge and task presentation ordering treatments on task accomplishment behavior. An interaction effect was found to influence the subject's search control strategy. The computer-specific knowledge base and task presentation ordering treatments were found to interact as joint moderators of search control strategy. Task performance was not found to be significantly influenced by interaction effects. Users' task accomplishment was modeled based upon problem-solving behavior. A subject's level of task domain knowledge was found to serve as a moderating factor of IS usage. Human information-processing strategies, IS usage, and task domain knowledge were integrated into a comprehensive IS user task model. This integrated model provides a robust characterization scheme for IS problem-solving support in a complex task environment.
APA, Harvard, Vancouver, ISO, and other styles
9

Ostroumov, Ivan Victorovich. "Magnetic field data processing with personal electronic device." Thesis, Polit. Challenges of science today: International Scientific and Practical Conference of Young Researchers and Students, April 6–8, 2016 : theses. – К., 2016. – 83p, 2016. http://er.nau.edu.ua/handle/NAU/26649.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Romig, Phillip R. "Parallel task processing of very large datasets." [Lincoln, Neb. : University of Nebraska-Lincoln], 1999. http://international.unl.edu/Private/1999/romigab.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Electronic data processing – Auditing"

1

Watne, Donald A. Auditing E.D.P. systems. Englewood Cliffs: Prentice-Hall, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

B, Turney Peter B., ed. Auditing EDP systems. 2nd ed. Englewood Cliffs, N.J: Prentice Hall, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

B, Turney Peter B., ed. Auditing EDP systems. 2nd ed. Englewood Cliffs, N.J: Prentice Hall, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

E, Perry William, ed. EDP, controls and auditing. 5th ed. Boston, Mass: Kent Pub. Co., 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Electronic data processing auditing: Conceptual foundation and practice. 2nd ed. Maidenhead: McGraw-Hill, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Information technology auditing and assurance. 3rd ed. Mason, Ohio: Thomson/South-Western, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

The practitioner's guide to EDP auditing. New York: New York Institute of Finance, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Paola, Bari, ed. Enterprise multiplatorm auditing. [Poughkeepsie, NY]: Information Technical Support Organization, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Paola, Bari, ed. Enterprise multiplatorm auditing. [Poughkeepsie, NY]: Information Technical Support Organization, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Perry, William E. A standard for auditing computer application: Auditing the systems maintenance process. Boston: Auerbach, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Electronic data processing – Auditing"

1

Daniel, Renée J. "Auditing Electronic Field Data." In ACS Symposium Series, 44–53. Washington, DC: American Chemical Society, 2002. http://dx.doi.org/10.1021/bk-2002-0824.ch008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Walsh, Vincent. "Electronic Data Processing." In Computer Literacy, 75–78. London: Macmillan Education UK, 1985. http://dx.doi.org/10.1007/978-1-349-07674-1_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Malley, Brian, Daniele Ramazzotti, and Joy Tzung-yu Wu. "Data Pre-processing." In Secondary Analysis of Electronic Health Records, 115–41. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-43742-2_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Younes, Hamoud, Mohamad Alameh, Ali Ibrahim, Mostafa Rizk, and Maurizio Valle. "Efficient Algorithms for Embedded Tactile Data Processing." In Electronic Skin, 113–38. New York: River Publishers, 2022. http://dx.doi.org/10.1201/9781003338062-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

da Silva, Vitória Viana, and Selma Oliveira. "Barriers to Implementing Big Data Analytics in Auditing." In Lecture Notes in Business Information Processing, 87–108. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-23012-7_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Schuster, Alfons, Simon McCaughey, and Roy Sterritt. "From Data to Intelligent Agents, Directions in a Data Intensive Data Processing Project." In Electronic Business and Education, 147–63. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-1-4615-1497-8_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

de Smit, Jacob. "Electronic Data Processing in Strategic Planning." In Operations Research Proceedings, 256. Berlin, Heidelberg: Springer Berlin Heidelberg, 1988. http://dx.doi.org/10.1007/978-3-642-73778-7_61.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Osta, Mario, Ali Ibrahim, and Maurizio Valle. "Approximate Arithmetic Circuits for Energy Efficient Data Processing in Electronic Skin." In Electronic Skin, 139–61. New York: River Publishers, 2022. http://dx.doi.org/10.1201/9781003338062-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Engel, Robert, Worarat Krathu, Marco Zapletal, Christian Pichler, Wil M. P. van der Aalst, and Hannes Werthner. "Process Mining for Electronic Data Interchange." In Lecture Notes in Business Information Processing, 77–88. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23014-1_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ibrahim, Ali, Luca Noli, Hussein Chible, and Maurizio Valle. "Embedded Electronic Systems for Tactile Data Processing." In Lecture Notes in Electrical Engineering, 17–23. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-47913-2_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Electronic data processing – Auditing"

1

Dembele, Simon Pierre, Ladjel Bellatreche, and Carlos Ordonez. "Towards Green Query Processing - Auditing Power Before Deploying." In 2020 IEEE International Conference on Big Data (Big Data). IEEE, 2020. http://dx.doi.org/10.1109/bigdata50022.2020.9377819.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Li, Tuo, and Lei Wang. "Key Technology of Online Auditing Data Stream Processing." In 2015 IEEE 12th Intl. Conf. on Ubiquitous Intelligence and Computing, 2015 IEEE 12th Intl. Conf. on Autonomic and Trusted Computing and 2015 IEEE 15th Intl. Conf. on Scalable Computing and Communications and its Associated Workshops (UIC-ATC-ScalCom). IEEE, 2015. http://dx.doi.org/10.1109/uic-atc-scalcom-cbdcom-iop.2015.156.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

"COMPLEX EVENT PROCESSING FOR SENSOR BASED DATA AUDITING." In 10th International Conference on Enterprise Information Systems. SciTePress - Science and and Technology Publications, 2008. http://dx.doi.org/10.5220/0001707004850491.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yang, Xiaodong, Tingting Liu, Ping Yang, Faying An, Miaomiao Yang, and Likun Xiao. "Public auditing scheme for cloud data with user revocation and data dynamics." In 2017 IEEE 2nd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC). IEEE, 2017. http://dx.doi.org/10.1109/itnec.2017.8284847.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

U, Rajatha, Sheema Wazir, Sheetal R, Bi Ameena, and Tejaswini R. Mungod. "IOT Based Load Monitoring and Auditing System." In 3rd National Conference on Image Processing, Computing, Communication, Networking and Data Analytics. AIJR Publisher, 2018. http://dx.doi.org/10.21467/proceedings.1.20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Suguna, M., and S. Mercy Shalinie. "Privacy preserving data auditing protocol for secure storage in mobile cloud computing." In 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET). IEEE, 2017. http://dx.doi.org/10.1109/wispnet.2017.8300258.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ma, Mingxiao, Jos Weber, and Jan van den Berg. "Secure public-auditing cloud storage enabling data dynamics in the standard model." In 2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC). IEEE, 2016. http://dx.doi.org/10.1109/dipdmwc.2016.7529384.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Abilash, G., N. Anusha, and T. Balaji. "Secure auditing of private cloud data associated with multiple owners using E-mail notification." In 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET). IEEE, 2017. http://dx.doi.org/10.1109/wispnet.2017.8299873.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, Lei, and Tuo Li. "Virtual Resource Allocation and Composition for Data Stream Processing of Online Auditing in Cloud Computing." In 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM). IEEE, 2015. http://dx.doi.org/10.1109/cit/iucc/dasc/picom.2015.119.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lee, JeongHun, and OkSam Chae. "Multimedia data processing algorithm development environment (MADE)." In Electronic Imaging '99, edited by Robert F. Erbacher, Philip C. Chen, and Craig M. Wittenbrink. SPIE, 1999. http://dx.doi.org/10.1117/12.342835.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Electronic data processing – Auditing"

1

Overberg, Mark E., Kent Martin Geib, Darwin Keith Serkland, Alan Yuan-Chun Hsu, Gordon Arthur Keeler, and Patrick Sean Finnegan. Electronic/photonic interfaces for ultrafast data processing. Office of Scientific and Technical Information (OSTI), September 2008. http://dx.doi.org/10.2172/940521.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Truett, L., and T. Yow. A study of auditing methodologies for the Energy Information Administration data collection and processing system quality assessment program. Office of Scientific and Technical Information (OSTI), November 1989. http://dx.doi.org/10.2172/5318803.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Avis, William. Drivers, Barriers and Opportunities of E-waste Management in Africa. Institute of Development Studies (IDS), December 2021. http://dx.doi.org/10.19088/k4d.2022.016.

Full text
Abstract:
Population growth, increasing prosperity and changing consumer habits globally are increasing demand for consumer electronics. Further to this, rapid changes in technology, falling prices and consumer appetite for better products have exacerbated e-waste management challenges and seen millions of tons of electronic devices become obsolete. This rapid literature review collates evidence from academic, policy focussed and grey literature on e-waste management in Africa. This report provides an overview of constitutes e-waste, the environmental and health impacts of e-waste, of the barriers to effective e-waste management, the opportunities associated with effective e-waste management and of the limited literature available that estimate future volumes of e-waste. Africa generated a total of 2.9 million Mt of e-waste, or 2.5 kg per capita, the lowest regional rate in the world. Africa’s e-waste is the product of Local and imported Sources of Used Electronic and Electrical Equipment (UEEE). Challenges in e-waste management in Africa are exacerbated by a lack of awareness, environmental legislation and limited financial resources. Proper disposal of e-waste requires training and investment in recycling and management technology as improper processing can have severe environmental and health effects. In Africa, thirteen countries have been identified as having a national e-waste legislation/policy.. The main barriers to effective e-waste management include: Insufficient legislative frameworks and government agencies’ lack of capacity to enforce regulations, Infrastructure, Operating standards and transparency, illegal imports, Security, Data gaps, Trust, Informality and Costs. Aspirations associated with energy transition and net zero are laudable, products associated with these goals can become major contributors to the e-waste challenge. The necessary wind turbines, solar panels, electric car batteries, and other "green" technologies require vast amounts of resources. Further to this, at the end of their lifetime, they can pose environmental hazards. An example of e-waste associated with energy transitions can be gleaned from the solar power sector. Different types of solar power cells need to undergo different treatments (mechanical, thermal, chemical) depending on type to recover the valuable metals contained. Similar issues apply to waste associated with other energy transition technologies. Although e-waste contains toxic and hazardous metals such as barium and mercury among others, it also contains non-ferrous metals such as copper, aluminium and precious metals such as gold and copper, which if recycled could have a value exceeding 55 billion euros. There thus exists an opportunity to convert existing e-waste challenges into an economic opportunity.
APA, Harvard, Vancouver, ISO, and other styles
4

Engel, Bernard, Yael Edan, James Simon, Hanoch Pasternak, and Shimon Edelman. Neural Networks for Quality Sorting of Agricultural Produce. United States Department of Agriculture, July 1996. http://dx.doi.org/10.32747/1996.7613033.bard.

Full text
Abstract:
The objectives of this project were to develop procedures and models, based on neural networks, for quality sorting of agricultural produce. Two research teams, one in Purdue University and the other in Israel, coordinated their research efforts on different aspects of each objective utilizing both melons and tomatoes as case studies. At Purdue: An expert system was developed to measure variances in human grading. Data were acquired from eight sensors: vision, two firmness sensors (destructive and nondestructive), chlorophyll from fluorescence, color sensor, electronic sniffer for odor detection, refractometer and a scale (mass). Data were analyzed and provided input for five classification models. Chlorophyll from fluorescence was found to give the best estimation for ripeness stage while the combination of machine vision and firmness from impact performed best for quality sorting. A new algorithm was developed to estimate and minimize training size for supervised classification. A new criteria was established to choose a training set such that a recurrent auto-associative memory neural network is stabilized. Moreover, this method provides for rapid and accurate updating of the classifier over growing seasons, production environments and cultivars. Different classification approaches (parametric and non-parametric) for grading were examined. Statistical methods were found to be as accurate as neural networks in grading. Classification models by voting did not enhance the classification significantly. A hybrid model that incorporated heuristic rules and either a numerical classifier or neural network was found to be superior in classification accuracy with half the required processing of solely the numerical classifier or neural network. In Israel: A multi-sensing approach utilizing non-destructive sensors was developed. Shape, color, stem identification, surface defects and bruises were measured using a color image processing system. Flavor parameters (sugar, acidity, volatiles) and ripeness were measured using a near-infrared system and an electronic sniffer. Mechanical properties were measured using three sensors: drop impact, resonance frequency and cyclic deformation. Classification algorithms for quality sorting of fruit based on multi-sensory data were developed and implemented. The algorithms included a dynamic artificial neural network, a back propagation neural network and multiple linear regression. Results indicated that classification based on multiple sensors may be applied in real-time sorting and can improve overall classification. Advanced image processing algorithms were developed for shape determination, bruise and stem identification and general color and color homogeneity. An unsupervised method was developed to extract necessary vision features. The primary advantage of the algorithms developed is their ability to learn to determine the visual quality of almost any fruit or vegetable with no need for specific modification and no a-priori knowledge. Moreover, since there is no assumption as to the type of blemish to be characterized, the algorithm is capable of distinguishing between stems and bruises. This enables sorting of fruit without knowing the fruits' orientation. A new algorithm for on-line clustering of data was developed. The algorithm's adaptability is designed to overcome some of the difficulties encountered when incrementally clustering sparse data and preserves information even with memory constraints. Large quantities of data (many images) of high dimensionality (due to multiple sensors) and new information arriving incrementally (a function of the temporal dynamics of any natural process) can now be processed. Furhermore, since the learning is done on-line, it can be implemented in real-time. The methodology developed was tested to determine external quality of tomatoes based on visual information. An improved model for color sorting which is stable and does not require recalibration for each season was developed for color determination. Excellent classification results were obtained for both color and firmness classification. Results indicted that maturity classification can be obtained using a drop-impact and a vision sensor in order to predict the storability and marketing of harvested fruits. In conclusion: We have been able to define quantitatively the critical parameters in the quality sorting and grading of both fresh market cantaloupes and tomatoes. We have been able to accomplish this using nondestructive measurements and in a manner consistent with expert human grading and in accordance with market acceptance. This research constructed and used large databases of both commodities, for comparative evaluation and optimization of expert system, statistical and/or neural network models. The models developed in this research were successfully tested, and should be applicable to a wide range of other fruits and vegetables. These findings are valuable for the development of on-line grading and sorting of agricultural produce through the incorporation of multiple measurement inputs that rapidly define quality in an automated manner, and in a manner consistent with the human graders and inspectors.
APA, Harvard, Vancouver, ISO, and other styles
5

Modlo, Yevhenii O., Serhiy O. Semerikov, Stanislav L. Bondarevskyi, Stanislav T. Tolmachev, Oksana M. Markova, and Pavlo P. Nechypurenko. Methods of using mobile Internet devices in the formation of the general scientific component of bachelor in electromechanics competency in modeling of technical objects. [б. в.], February 2020. http://dx.doi.org/10.31812/123456789/3677.

Full text
Abstract:
An analysis of the experience of professional training bachelors of electromechanics in Ukraine and abroad made it possible to determine that one of the leading trends in its modernization is the synergistic integration of various engineering branches (mechanical, electrical, electronic engineering and automation) in mechatronics for the purpose of design, manufacture, operation and maintenance electromechanical equipment. Teaching mechatronics provides for the meaningful integration of various disciplines of professional and practical training bachelors of electromechanics based on the concept of modeling and technological integration of various organizational forms and teaching methods based on the concept of mobility. Within this approach, the leading learning tools of bachelors of electromechanics are mobile Internet devices (MID) – a multimedia mobile devices that provide wireless access to information and communication Internet services for collecting, organizing, storing, processing, transmitting, presenting all kinds of messages and data. The authors reveals the main possibilities of using MID in learning to ensure equal access to education, personalized learning, instant feedback and evaluating learning outcomes, mobile learning, productive use of time spent in classrooms, creating mobile learning communities, support situated learning, development of continuous seamless learning, ensuring the gap between formal and informal learning, minimize educational disruption in conflict and disaster areas, assist learners with disabilities, improve the quality of the communication and the management of institution, and maximize the cost-efficiency. Bachelor of electromechanics competency in modeling of technical objects is a personal and vocational ability, which includes a system of knowledge, skills, experience in learning and research activities on modeling mechatronic systems and a positive value attitude towards it; bachelor of electromechanics should be ready and able to use methods and software/hardware modeling tools for processes analyzes, systems synthesis, evaluating their reliability and effectiveness for solving practical problems in professional field. The competency structure of the bachelor of electromechanics in the modeling of technical objects is reflected in three groups of competencies: general scientific, general professional and specialized professional. The implementation of the technique of using MID in learning bachelors of electromechanics in modeling of technical objects is the appropriate methodic of using, the component of which is partial methods for using MID in the formation of the general scientific component of the bachelor of electromechanics competency in modeling of technical objects, are disclosed by example academic disciplines “Higher mathematics”, “Computers and programming”, “Engineering mechanics”, “Electrical machines”. The leading tools of formation of the general scientific component of bachelor in electromechanics competency in modeling of technical objects are augmented reality mobile tools (to visualize the objects’ structure and modeling results), mobile computer mathematical systems (universal tools used at all stages of modeling learning), cloud based spreadsheets (as modeling tools) and text editors (to make the program description of model), mobile computer-aided design systems (to create and view the physical properties of models of technical objects) and mobile communication tools (to organize a joint activity in modeling).
APA, Harvard, Vancouver, ISO, and other styles
6

Electronic Data Processing (EDP) Section - c.1965. Reserve Bank of Australia, September 2022. http://dx.doi.org/10.47688/rba_archives_pn-004508.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Federal Information Processing Standards Publication: electronic data interchange (EDI). Gaithersburg, MD: National Institute of Standards and Technology, 1996. http://dx.doi.org/10.6028/nist.fips.161-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Premises - Head Office - Electronic Data Processing (EDP) Section, 1969. Reserve Bank of Australia, September 2022. http://dx.doi.org/10.47688/rba_archives_pn-004822.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Staff at Work - Electronic Data Processing (EDP) Section - September 1968. Reserve Bank of Australia, September 2022. http://dx.doi.org/10.47688/rba_archives_pn-004746.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Premises - Head Office - Electronic Data Processing (EDP) Section, 1969 (copy b). Reserve Bank of Australia, September 2022. http://dx.doi.org/10.47688/rba_archives_pn-004823.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography