In the current paradigms of information technology, cloud computing is the most essential kind of computer service. It satisfies the need for high-volume customers, flexible computing capabilities for a range of applications like as database archiving and business analytics, and the requirement for extra computer resources to provide a financial value for cloud providers. The purpose of this investigation is to assess the viability of doing data audits remotely inside a cloud computing setting. There includes discussion of the theory behind cloud computing and distributed storage systems, as well as the method of remote data auditing. In this research, it is mentioned to safeguard the data that is outsourced and stored in cloud servers. There are four different techniques of remote data auditing procedures that are presented here for distributed cloud services. There are several difficulties associated with data audit methods; however, these difficulties may be overcome by using a variety of techniques, such as the Boneh-Lynn-Shacham signature or the automated blocker protocol. In addition to that, other difficulties associated with distributed-based remote data auditing solutions are discussed. In addition, a variety of approaches might be researched further for further examination in order to find answers to these impending problems.
The research aims to identify the theoretical framework of technical reserves in the insurance activity and the role of the auditor in verifying the integrity of the estimates of technical provisions (technical reserves) for the branches of general insurance in insurance companies based on the relevant international auditing standards, as a proposed audit program has been prepared in accordance with international auditing standards that enable the auditor to express a sound opinion on the fairness of the financial statements of these companies , The research has reached many conclusions, the most important of which is the existence of deficiencies in the audit procedures of insurance companies, as the audit program of those companies did
... Show MoreThe Evolution Of Information Technology And The Use Of Computer Systems Led To Increase Attention To The Use Of Modern Techniques In The Auditing Process , As It Will Overcome Some Of The Human Shortcomings In The Exercise Of Professional Judgment, Then It Can Improve The Efficiency And Effectiveness Of The Audit Process, Where The New Audit Methodologies Espouse The Concept Of Risk Which Includes Strategic Dimension With Regard To The Capacity Of The Entity To Achieve Its Goals, Which Requires Auditors To Rely On Advanced Technology That Can Identify The Factors Which Prevent The Entity From Achieving Its Objectives. The Idea Of Research Is To Preparing An Electronic Program Fer All Audit Work From Planning Through Sampling And Document
... Show MoreAt the beginning of the nineties increased responsibility of the auditor to the community as the demand for auditing the environmental performance for the economic units in addition to audit the financial performance. With the aim of preserving the environment and reducing the damagse as aresult of the negative effects of the activities of these units.
The researh deal with two sides the first one identifies the theoretical framework of the concept of environmental audits, requirements, methods, types of procedures, and duties of the auditor in conducting environmental audits. It also deals with the concept of the enviro
... Show MoreThe current research aims to show the impact of the international auditing standard IAS 540 in reducing income smoothing practices in Iraq. To achieve the objectives of the research, the researcher adopted a questionnaire for a sample of auditors in Iraq. Where 60 forms were distributed and after the questionnaire was retrieved and statistical analysis was done using the SPSS program, The research reached a number of results, the most important of which are: the existence of a statistically significant effect of the application of the international auditing standard IAS 540 in reducing income smoothing practices, The research recommended the necess
... Show MoreThe Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show MoreAnomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the
... Show MoreIn data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me
This study aimed to identify the role of digital transformation in improving the quality of the internal audit process. The researchers used the descriptive analytical approach, and the questionnaire was relied on as a study tool that was applied to the study population consisting of internal auditors working in banks listed on the Palestine Stock Exchange, and their number was (85). A checker and a comprehensive inventory method was used due to the small size of the community, where the response data of the questionnaire was analyzed and interpreted using the Statistical Packages Program (SPSS).
The results of the study showed that the use of digital transformation contributes to ensuring the quality of
... Show More