Essays about: "Information System Audit"

Showing result 11 - 15 of 26 essays containing the words Information System Audit.

  1. 11. Detecting access to sensitive data in software extensions through static analysis

    University essay from Linköpings universitet/Programvara och system

    Author : Johan Hedlin; Joakim Kahlström; [2019]
    Keywords : static analysis; extensions; plugin; sensitive data; statisk analys; tillägg; känslig data;

    Abstract : Static analysis is a technique to automatically audit code without having to execute or manually read through it. It is highly effective and can scan large amounts of code or text very quickly. This thesis uses static analysis to find potential threats within a software's extension modules. READ MORE

  2. 12. Design for Addressing Data Privacy Issues in Legacy Enterprise Application Integration

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Kavindra Kulathilake Meddeoda Gedara; [2019]
    Keywords : B2B; EDI; EDIFACT; GDPR; Enterprise Application Integration; Middleware Broker; Tokenization; Data Privacy;

    Abstract : Electronic message transfer is the key element in enterprise application integration (EAI) and the privacy of data transferred must be protected by the systems involved in the message transfer from origin to the destination. The recent data privacy regulation such as GDPR (General Data Protection Regulation) has enforced the organizations to ensure the privacy of the personal data handled with obligations to provide visibility and control over to the data owner. READ MORE

  3. 13. Systematic observation in healthcare: Utility and limitations of a threat and error management-based safety audit

    University essay from Lunds universitet/Avdelningen för Riskhantering och Samhällssäkerhet

    Author : Andrew Grose; [2018]
    Keywords : healthcare; systematic observation; threat and error management; patient safety; FLMU06; CRM; Crew Resource Management; teamwork; team performance; General Works;

    Abstract : Improving teamwork has become a major safety goal for healthcare organizations. Audit tools currently available are useful, but they remain inadequate because they are reactive and fail to provide context for “the interaction between people and the operational context (i.e. READ MORE

  4. 14. Blockchain Accounting in a Tripple-Entry System

    University essay from Lunds universitet/Företagsekonomiska institutionen

    Author : Mahir Hambiralovic; Rasmus Karlsson; [2018]
    Keywords : Blockchain Accounting; Triple-Entry Accounting; Request Network; Real-Time Accounting; Automated Audit; Business and Economics;

    Abstract : Title: Blockchain Accounting in a Triple-Entry System - Its Implications on the Firm and its Stakeholders, a Case Study on the Request Network. Seminar date: 1st of June 2018 Course: FEKH69 & FEKH89, Degree Project Undergraduate Level, Business Administration, Undergraduate Level, 15 University Credits Points (UPC) or ECTS-cr) Authors: Mahir Hambiralovic & Rasmus Karlsson Advisor: Rolf G Larsson Keywords: Blockchain Accounting, Triple-Entry Accounting, Request Network, Real-Time Accounting, Automated Audit Purpose: To continue previous research on blockchain accounting and to explore how the technology could alter industries and professions over time. READ MORE

  5. 15. External Auditor’s Trust in Internal Auditors : The Cultural Effect - A Study Between Greece and Sweden

    University essay from Karlstads universitet/Avdelningen för företagsekonomi

    Author : Nicklas Paulsson; Sofia Oikonomidi; [2016]
    Keywords : Auditor; trust; culture; internal auditor; external auditor; cultural effect; Sweden; Greece;

    Abstract : Nowadays, the importance of the external auditing is demonstrated by the highly risky business environments, that fertilize the fraud and irregularities, which lead businesses to provide mistaken financial statements and misleading financial information. The uncertainty that occurs in the decision process in businesses, enhance the risks and requires the attention of the employees. READ MORE