This paper analysed the effect of electronic internal auditing (EIA) based on the Control Objectives for Information and Related Technologies (COBIT) framework. Organisations must implement an up-to-date accounting information system (AIS) capable of meeting their auditing requirements. Electronic audit risk (compliance assessment, control assurance, and risk assessment) is a development by Weidenmier and Ramamoorti (2006) to improve AIS. In order to fulfil the study’s objectives, a questionnaire was prepared and distributed to a sample comprising 120 employees. The employees were financial managers, internal auditors, and workers involved in the company’s information security departments in the General Company for Electricity Distribution (GCBED) of Baghdad, owned by the Iraqi federal government. The Statistical Package for the Social Sciences (SPSS) software was employed to analyse the data and hypotheses. The study concluded that there is a substantial effect on the performance of EIA depending on the COBIT framework in reducing electronic audit risk in GCBED. According to the findings, additional research should be undertaken to improve efficiency, accounting control efficiency, and asset protection programs to lessen audit risk.
In the present research a new test rig has been proposed to be suitable for different cyclic loads such as cyclic bending, cyclic torsion, proportional and non proportional loads. In this work the efforts were concentrated on the cyclic bending loads concerning cracked pipes with or without internal pulsing pressure to study crack propagation in small bore pipes (up to 1'') for transverse or inclined cracks. The rig simulates the real service conditions under different stresses by means the least dangerous case will be suggested, so the experiments were considered for copper pipe, and the results have been tabulated and drawn to demonstrate the crack growth behavior as well as to justify the outcomes practically, consequently the durabil
... Show MoreThe research aims to verify the Role of Internal Auditing in Assessing the Risks of Strategic Operations (Acquisition) and then reflect on management decisions. Since all corporations wish to expand, growth and domination of the market may expose them to multiple risks that lead to failure. The research assumes two main hypotheses. First, there is no role for internal audit in evaluating the strategic operations (acquisition). Second, there is no relationship between internal auditing in assessing the risks of strategic operations (Acquisition) and management decisions. The data was collected by using a questionnaire distributed to a group of private bank employees. The statistical analysis regarding research rejected the two hyp
... Show MoreAbstract
This research aims to define the roles of auditors by clarifying the concept and risks of cyber security in protecting information and financial data in economic units. Najaf, Babylon and Karbala, then the results were analyzed and the results were presented and analyzed to show that adopting cyber security improves the quality of reports Finance through what it achieves in displaying information with credibility and transparency, in a way that suits the needs of users, and cyber security has a role in managing economic resources more effectively to obtain benefits that would have been lost in the event of an
... Show MoreThe research aims to demonstrate the impact of tax techniques on the quality of services provided to income taxpayers by studying the correlational and influencing relationships between the exploited variable (tax techniques) and the dependent variable (the quality of services provided to income taxpayers), and in line with the research objectives, the main hypothesis of the research was formulated (there is a relationship Significance between tax techniques and the quality of services provided to income taxpayers) a number of sub-hypotheses emerged from this hypothesis that were stated in the research methodology, and a number of conclusions were reached, the most important of which were (through the use of the correlation coeff
... Show MoreEach school of Islamic jurisprudence has principles and rules upon which the diligent work in these schools is based. This is due to the view of sanctification of these rulings, as they are divine rulings. Therefore, the goal is to reach a ruling that represents the intent of the legislator as much as possible.
Hence, these schools of thought established rules for issuing fatwas with the intention of restricting the performance of a fatwa to the hands of those who are qualified for it and have met its conditions, so they gave priority to the most knowledgeable person over others to perform the fatwa. In the Hanafi school of thought, for example, the saying of Imam Abu Hanifa (may God have mercy on him) is given precedence over others,
Background: Breast cancer remains a substantial cause of morbidity and mortality, there is a need for continued efforts to understand the etiology of the disease, maintain screening effort, implement prevention strategies, and develop better treatments.Objective: To analyze the risk factors, improve early detection and prevention of breast cancer in Al-Russafa district- Baghdad, aiming to increase survival rate and improve the quality of life.Methods: A cross sectional audit of 258 breast cancer cases seen at Al-Elwiya maternity teaching hospital from January2009 to December 2011,data collected from patients files were: age, gender , residency, marital status, parity, age at menarche and menopause age at first live birth, hormonal therap
... Show MoreSummary
I wanted to address this topic because of creedal purposes importance,and its r le in regulating lives of individuals and society, and to talk about purposes of Almighty's saying:{It is easy for me},to simplify its meanings for general educated person to obtain the believe of the Creator’s power and his oneness.
Therefore,this research came,whichincludes:an introduction and topics, first :concept of creedal objectives and their divisions,second: creedal purposes in Almighty’s saying:{It is easy for me},and conclusion:in where most important results were included:
... Show MoreThe present theoretical study analyzes the legacy of the Chicago School of Urban Sociology and evaluates it in the light of the growth and development of Chicago City and the establishment of sociology in it. Sociology has become an academic discipline recognized in the United States of America in the late nineteenth century, particularly, after the establishment of the first department of sociology in the University of Chicago in 1892. That was during the period of the rapid industrialization and sustainable growth of the Chicago City. The Chicago School relied on Chicago City in particular, as one of the American cities that grew and expanded rapidly in the first two decades of the twentieth century. At the end of the nineteenth centur
... Show MoreAs an important resource, entanglement light source has been used in developing quantum information technologies, such as quantum key distribution(QKD). There are few experiments implementing entanglement-based deterministic QKD protocols since the security of existing protocols may be compromised in lossy channels. In this work, we report on a loss-tolerant deterministic QKD experiment which follows a modified “Ping-Pong”(PP) protocol. The experiment results demonstrate for the first time that a secure deterministic QKD session can be fulfilled in a channel with an optical loss of 9 dB, based on a telecom-band entangled photon source. This exhibits a conceivable prospect of ultilizing entanglement light source in real-life fiber-based
... Show MoreThe internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will
... Show More