Essays about: "Information System Audit"
Showing result 21 - 25 of 26 essays containing the words Information System Audit.
-
21. A Validation of an IT Investment Evaluation Model in Health and Social Care : A case study of ERAS Interactive Audit System (EIAS)
University essay from IHH, InformatikAbstract : Introduction: The traditional IT investment evaluation methods and/or techniques tend to measure the quantitative value added by eHealth. However, there are contributions brought by innovation which are intangible and sundry, and thus are difficult to identify, measure and manage. READ MORE
-
22. The abolishment of the statutory audit requirement -Does it change vredit assessment processes?
University essay from Göteborgs universitet/Företagsekonomiska institutionenAbstract : Background: In November 2010, the statutory audit requirement in Sweden was abolished for Swedish SMEs. The abolishment was the result of the objective of a 25% reduction of administrative costs, for companies within the European Union. READ MORE
-
23. Determinants for Effective Application of Software in Computer Assisted Auditing Techniques (CAATs)
University essay from Blekinge Tekniska Högskola/Sektionen för managementAbstract : The purposes of this study are to get an over all picture of the general objectives and awareness of auditors for the adoption of CAATs and the current level of involvement of auditors in the application of CAATs in the audit process, which software and techniques they use and the possible causes for non use or less efficient use of CAATs. Once the determinant factors are identified, their implications for audit firms and to employees in the auditing profession are also discussed. READ MORE
-
24. Re-authentication of Critical Operations
University essay from Institutionen för systemteknikAbstract : This is a study on the development of a re-authentication prototype. Re- authentication serves as a receipt for e.g. system administrators that authorise them to carry out a critical operation in a system that already is protected by a security architecture. READ MORE
-
25. Viewing patients' x-rays in the radiologist's home
University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknik och datavetenskapAbstract : Our assignment was to present a report to the radiology clinic at the County Hospital in Blekinge, evaluating the risks inherent in transferring patient information via Internet between the radiologist?s home and the hospital and presenting suggestions to the clinic for mechanisms by which the privacy and personal health of the patient can be ensured. Our aim was to investigate how to maintain an acceptable level of security to ensure that the patient?s privacy and security are not threatened. READ MORE