Essays about: "Information System Audit"

Showing result 21 - 25 of 26 essays containing the words Information System Audit.

  1. 21. A Validation of an IT Investment Evaluation Model in Health and Social Care : A case study of ERAS Interactive Audit System (EIAS)

    University essay from IHH, Informatik

    Author : Chen Lin; Jing Ma; [2012]
    Keywords : eHealth; Health informatics; IT investment evaluation; Validation of Model; Effect of eHealth; Impact of eHealth; Contribution of eHealth; Model performance; Comprehensiveness; Practicality; Applicability;

    Abstract : Introduction: The traditional IT investment evaluation methods and/or techniques tend to measure the quantitative value added by eHealth. However, there are contributions brought by innovation which are intangible and sundry, and thus are difficult to identify, measure and manage. READ MORE

  2. 22. The abolishment of the statutory audit requirement -Does it change vredit assessment processes?

    University essay from Göteborgs universitet/Företagsekonomiska institutionen

    Author : Carina Backestål; Emil Carlsson; [2011-09-01]
    Keywords : ;

    Abstract : Background: In November 2010, the statutory audit requirement in Sweden was abolished for Swedish SMEs. The abolishment was the result of the objective of a 25% reduction of administrative costs, for companies within the European Union. READ MORE

  3. 23. Determinants for Effective Application of Software in Computer Assisted Auditing Techniques (CAATs)

    University essay from Blekinge Tekniska Högskola/Sektionen för management

    Author : Zeleke Belay Temesgen; [2004]
    Keywords : Accounting information system AIS ; auditing; audit process; continuous auditing; Information technology IT ; IT adoption; e-commerce economy; audit software; efficiency and effectiveness. ;

    Abstract : The purposes of this study are to get an over all picture of the general objectives and awareness of auditors for the adoption of CAATs and the current level of involvement of auditors in the application of CAATs in the audit process, which software and techniques they use and the possible causes for non use or less efficient use of CAATs. Once the determinant factors are identified, their implications for audit firms and to employees in the auditing profession are also discussed. READ MORE

  4. 24. Re-authentication of Critical Operations

    University essay from Institutionen för systemteknik

    Author : Marwan Yachouh; [2002]
    Keywords : Informationsteknik; Computer Security; Distributed Systems; Access-control; Certificates; Re-authentication Certificates; Cryptography.; Informationsteknik;

    Abstract : This is a study on the development of a re-authentication prototype. Re- authentication serves as a receipt for e.g. system administrators that authorise them to carry out a critical operation in a system that already is protected by a security architecture. READ MORE

  5. 25. Viewing patients' x-rays in the radiologist's home

    University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknik och datavetenskap

    Author : Annicka Gunnarsson; Eva Lindros; Jeff Winter; [2002]
    Keywords : security; säkerhet; Internet; network; nätverk; health care; hälsovård; x-ray; röntgen.;

    Abstract : Our assignment was to present a report to the radiology clinic at the County Hospital in Blekinge, evaluating the risks inherent in transferring patient information via Internet between the radiologist?s home and the hospital and presenting suggestions to the clinic for mechanisms by which the privacy and personal health of the patient can be ensured. Our aim was to investigate how to maintain an acceptable level of security to ensure that the patient?s privacy and security are not threatened. READ MORE