• Title/Summary/Keyword: Rapid audit

Search Result 20, Processing Time 0.023 seconds

A Study on the Construction of an Auditing Expert Systems (회계감사 전문가시스템의 구축에 관한 연구)

  • 김동균;이학열
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.17 no.32
    • /
    • pp.297-308
    • /
    • 1994
  • In the information system, there are many fields that used by decision making support system. Nowadays, the reasons that the need of the decision making system in audit is increased, are as follows. \circled1 The increased of competitiveness in audit environment \circled2 The rapid replenishment of computer hardware and computer system in corporations. The purposes of this study are as follows. \circled1 The connection of Internal management assess results and practical examination. \circled2 In the making of audit opinion, the establish of non-measure and evaluate logic. \circled3 The suggestion of knowledge base structure about the audit task. \circled4 The development of prototype system for the accounting audit expert system. The expected usefulness of accounting audit expert system development are as follows. \circled1 Audit time may be saved \circled2 The consistence of opinion will be increased \circled3 The elevation of audit technique \circled4 The decreased of audit risk \circled5 In the decision making rationlization of accounting information users, it will be proved as usefulness.

  • PDF

Applied Limit for Biotechnology (정보시스템 감리)

  • 이경덕
    • Journal of the Korean Professional Engineers Association
    • /
    • v.34 no.4
    • /
    • pp.65-68
    • /
    • 2001
  • The role of information system(IS) audit is growing more important according to rapid change of Information technology. This article is to introduce what is IS audit, purpose and effect of IS audit. Now most clients of private IS audit services companies are the public sector. Korean public sectors invest a lot of money to build or implement their information system. Most of their systems are developed by system intergration companies. But they do not have professional engineers to evaluate and review outsourced information system. Therefore they must use outside private professional engineers for sysem auditing. We, including writer, established the first IS audit sevice company in Korea on September in 1997. After that about 15 IS audit service companies are established until now. The effect of IS audit is highly evaluated In public sector by the clients Most clients think IS audit service contributed to upgrade the quality of software and standard the methodology of developing system

  • PDF

A Design of University Information System Operation Audit Model based on ITIL V3

  • Kim, Hee-Wan;Kang, Bo-Ra;Kim, Dong-Soo;Moon, Song-Chul
    • Journal of Information Technology Applications and Management
    • /
    • v.25 no.3
    • /
    • pp.29-41
    • /
    • 2018
  • The purpose of constructing university information system is for improvement in diversification and throughput of information, streamlines business processes, rapid exchange of information, sharing of information, decision-making information, and securing educational facilities. Similar to business information technology system, university information system does not have a review system for sharing and overlapping investment of information. Due to the lack of project management for outsourcing and vulnerability of system suitability, system audit is absolutely needed for the university information system. This paper especially focuses on an operational phase in the audit of university information system. Additionally, we proposed operating model and checklists of the university information system based on Management Guidelines of ITIL V3 Operational and Information System. We derived the checklists of operation audit by each domain of service strategy, service design, service transition, service operation, and continual service improvement. As the result, this study appear to have more than average satisfaction the suitability results were.

The Model of Information System Operating Audit for the Service Level Agreement (서비스 수준 협약에 따른 정보시스템 운영감리 모형)

  • Lee, Sung-Ho;Choi, Jin-Tak;Kim, Dong-Soo;Kim, Hee-Wan
    • Journal of Digital Convergence
    • /
    • v.10 no.6
    • /
    • pp.71-82
    • /
    • 2012
  • The interest in SLA in accordance with the development of IT outsourcing has increased due to the rapid development of information systems. Moreover, an awareness and necessity for the Information System Operating Audit has increased while an effective IT service management operations for information systems is needed desperately. However, information system operations and maintenance instructions of the National Information Society Agency operates due to the current information system operation, but the experience and the interpretation of the auditor determine the decision in the field. This paper introduces an operating audit model for the efficient management. This model is derived from the Korea Information Society Agency's operating instructions of the Information Systems Audit and their inspection services. The audit checklists were derived from the areas of service planning, service delivery, service support, and service management. Consequently, the operating audit model was proposed, and the suitability of this model was verified by experts' opinions on the survey.

Design and Implementation of Web Attack Detection System Based on Integrated Web Audit Data (통합 이벤트 로그 기반 웹 공격 탐지 시스템 설계 및 구현)

  • Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.11 no.6
    • /
    • pp.73-86
    • /
    • 2010
  • In proportion to the rapid increase in the number of Web users, web attack techniques are also getting more sophisticated. Therefore, we need not only to detect Web attack based on the log analysis but also to extract web attack events from audit information such as Web firewall, Web IDS and system logs for detecting abnormal Web behaviors. In this paper, web attack detection system was designed and implemented based on integrated web audit data for detecting diverse web attack by generating integrated log information generated from W3C form of IIS log and web firewall/IDS log. The proposed system analyzes multiple web sessions and determines its correlation between the sessions and web attack efficiently. Therefore, proposed system has advantages on extracting the latest web attack events efficiently by designing and implementing the multiple web session and log correlation analysis actively.

Project Failure Main Factors Analysis using Text Mining in Audit Evaluation (감리결과에 텍스트마이닝 기법을 적용한 프로젝트 실패 주요요인 분석)

  • Jang, Kyoungae;Jang, Seong Yong;Kim, Woo-Je
    • Journal of KIISE
    • /
    • v.42 no.4
    • /
    • pp.468-474
    • /
    • 2015
  • Corporations should make efforts to recognize the importance of projects, identify their failure factors, prevent risks in advance, and raise the success rates, because the corporations need to make quick responses to rapid external changes. There are some previous studies on success and failure factors of projects, however, most of them have limitations in terms of objectivity and quantitative analysis based on data gathering through surveys, statistical sampling and analysis. This study analyzes the failure factors of projects based on data mining to find problems with projects in an audit report, which is an objective project evaluation report. To do this, we identified the texts in the paragraph of suggestions about improvement. We made use of the superior classification algorithms in this study, which were NaiveBayes, SMO and J48. They were evaluated in terms of data of Recall and Precision after performing 10-fold-cross validation. In the identified texts, the failure factors of projects were analyzed so that they could be utilized in project implementation.

Factors that determine the Work Ability Index of street cleaners

  • Kim, Jung Won;Yang, Seonhee;Chung, Insung;Lee, Mi-Young
    • Journal of Yeungnam Medical Science
    • /
    • v.36 no.3
    • /
    • pp.219-224
    • /
    • 2019
  • Background: Korea has shown a rapid pace of aging and has become an aged society in a shorter period than Western countries. Therefore, it is important that middle-aged workers maintain their ability to work in the industrial field at the maximum level while maintaining their health. The purpose of this study was to analyze the factors affecting work ability and to use this data to maintain the working ability of middle-aged workers in the future. Methods: From 2015 to 2017, we surveyed 371 street cleaners who visited a health center for health promotion in a metropolitan city. The relationship between the general characteristics of the survey subjects and the Work Ability Index (WAI) was confirmed by a univariate analysis. Statistically significant (p<0.2) factors were selected and a multiple linear regression analysis was conducted with WAI scores as a dependent variable. Results: Age, body mass index, body fat percentage, the Alcohol Use Disorders Identification Test-Korea (AUDIT-K) scores, the Psychosocial Well-Being Index-Short Form (PWI-SF) scores, maximal oxygen consumption ($VO_{2max}$), and hypertension showed statistically significant correlations with the WAI in the univariate analysis. In the multivariate analysis, the $VO_{2max}$, AUDIT-K scores, and PWI-SF scores were included in the regression equation. $VO_{2max}$ had the greatest effect on the standardization coefficient indicating the relative contribution of independent variables, followed by the AUDIT-K scores and the PWI-SF scores. Conclusion: Programs to increase workers' physical work ability and alleviate psychosocial stress and drinking habits should be developed and implemented in the future.

On the Hybrid Intrusion Detection System based Biometric Efficiency (생체 면역 기반의 하이브리드 침입 탐지 시스템에 관하여)

  • 양은목;이상용;서창호;김석우
    • Convergence Security Journal
    • /
    • v.1 no.1
    • /
    • pp.57-68
    • /
    • 2001
  • Computer security is considered important because of the side effect generated from the expansion of computer network and rapid increase of the use of computer. Intrusion Detection System(IDS) has been an active research area to reduce the risk from intruders. In this paper, the Hybrid Intrusion Detection System(HIDS) based biometric immuntiy collects and filters audit data by misuse detection is innate immune, and anomaly detection is acquirement immune in multi-hosts. Since, collect and detect audit data from one the system in molt-hosts, it is design and implement of the intrusion detection system which has the immuntiy the detection intrusion in one host possibly can detect in multi-hosts and in the method of misuses detection subsequently.

  • PDF

Strength and Durability Test of Rapid Hardening Composite Mat for Protect Railway Slope in Operation (운영중인 철도비탈면 보호를 위한 초속경 복합매트의 강도 및 내구성 실험)

  • Hyun-Sang, Yoo;Tae-Hee, Kang;Hyuk-Sang, Jung;In-Chul, Back
    • Journal of the Korean Geosynthetics Society
    • /
    • v.21 no.4
    • /
    • pp.79-91
    • /
    • 2022
  • Recently, the frequency of damage to slopes for highways, railways, and complexes has been increasing according to abnormal climates such as heavy rainfall or snowfall. Rapid Hardening Composite Mat (RHCM) could be a satisfactory alternative because it has the advantages that large-scale earthwork is not essential and the period for restoration is minimized. Also, this method does not require heavy machines and a phase of maintenance for slopes against the shotcrete method or planted slope protection, which are representative slope protection methods. Furthermore, the curing time is shorter than Geosynthetic Concrete Composite Mat (GCCM). Therefore, RHCM could be useful for emergency restoration work. Thus, in this study, the strength and duration of RHCM are estimated, compared, and analyzed with GCCM. As a result of the laboratory test, the strength of RHCM is greater 51%, and the duration is larger 69% than GCCM.

Optimization of the Educational Environment Using Information Technologies

  • Sherman, Mykhailo;Martynyshyn, Yaroslav;Khlystun, Olena;Chukhrai, Liubov;Kliuchko, Yuliia;Savkiv, Uliana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.80-83
    • /
    • 2021
  • The article analyzes and shows the rapid development information and telecommunication technologies, and their capabilities are becoming unprecedented for human development, effective solutions to many professional problems. The analysis of information and communication technologies of education used in higher educational institutions of Ukraine confirmed that for the effective use of special teaching methods, as well as software and technical teaching aids, it is necessary to have a trained teaching staff and students.