• Title/Summary/Keyword: auditing

Search Result 322, Processing Time 0.027 seconds

GRID BASED ENERGY EFFICIENT AND SECURED DATA TRANSACTION FOR CLOUD ASSISTED WSN-IOT

  • L. SASIREGA;C. SHANTHI
    • Journal of applied mathematics & informatics
    • /
    • v.41 no.1
    • /
    • pp.95-105
    • /
    • 2023
  • To make the network energy efficient and to protect the network from malignant user's energy efficient grid based secret key sharing scheme is proposed. The cost function is evaluated to select the optimal nodes for carrying out the data transaction process. The network is split into equal number of grids and each grid is placed with certain number of nodes. The node cost function is estimated for all the nodes present in the network. Once the optimal energy proficient nodes are selected then the data transaction process is carried out in a secured way using malicious nodes filtration process. Therefore, the message is transmitted in a secret sharing method to the end user and this process makes the network more efficient. The proposed work is evaluated in network simulated and the performance of the work are analysed in terms of energy, delay, packet delivery ratio, and false detection ratio. From the result, we observed that the work outperforms the other works and achieves better energy and reduced packet rate.

Role of Forensic Accounting to Strengthen Corporate Governance : An Empirical Study

  • Bhasin, Madan Lal
    • The Journal of Economics, Marketing and Management
    • /
    • v.5 no.1
    • /
    • pp.1-20
    • /
    • 2017
  • An increasing number of researchers are finding that 'poor' CG is a leading factor in dismal performance, manipulated financial reports, and unhappy stakeholders. Undoubtedly, qualified, trained and mature Chartered Forensic Accountants (CFA's) can prove to be a valuable asset to the corporate sector, and gradually help to improve their CG system. The fundamental objective of this study is to find out "how can we integrate the expertise of the FA to improve the overall CG scenario prevalent in India?" This is a preliminary investigation of the necessary skills, educational and training requirements for CFA's to improve CG system. During 2011-12, a questionnaire-based survey was conducted in the NCR of India using a sample size of 120 practicing chartered accountants, accounting academics, and potential users of FA services. Results indicate that potential practitioners, academics and users agree that "critical thinking, written & oral communication, legal knowledge, auditing skills, deductive analysis, investigative flexibility, analytical proficiency and unstructured problem-solving are the most important skills required for the CFAs." Moreover, we found that all of the skills investigated in this study are 'potentially' important for the CFAs, which the educators at the Universities should use as an overall guide while designing their FA curriculum."

Robust and Auditable Secure Data Access Control in Clouds

  • KARPAGADEEPA.S;VIJAYAKUMAR.P
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.95-102
    • /
    • 2024
  • In distributed computing, accessible encryption strategy over Auditable data is a hot research field. Be that as it may, most existing system on encoded look and auditable over outsourced cloud information and disregard customized seek goal. Distributed storage space get to manage is imperative for the security of given information, where information security is executed just for the encoded content. It is a smaller amount secure in light of the fact that the Intruder has been endeavored to separate the scrambled records or Information. To determine this issue we have actualize (CBC) figure piece fastening. It is tied in with adding XOR each plaintext piece to the figure content square that was already delivered. We propose a novel heterogeneous structure to evaluate the issue of single-point execution bottleneck and give a more proficient access control plot with a reviewing component. In the interim, in our plan, a CA (Central Authority) is acquainted with create mystery keys for authenticity confirmed clients. Not at all like other multi specialist get to control plots, each of the experts in our plan deals with the entire trait set independently. Keywords: Cloud storage, Access control, Auditing, CBC.

A Study of Definition of Security Requirements on Encryption and Audit Logging (암호화와 감사 로깅에서 보안 요건 정의 연구)

  • Shin, Seong-Yoon;Lee, Kang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.9
    • /
    • pp.85-91
    • /
    • 2014
  • Encryption is a method to convert information to no-sense code in order to prevent data from being lost or altered by use of illegal means. Audit logging creates audit log of users' activities, exceptions, and information security events, and then conserves it for a certain period for investigation and access-control auditing. Our paper suggests that confidentiality and integrity of information should be guaranteed when transmitting and storing important information in encryption. Encryption should consider both one-way encryption and two-way one and that encryption key should assure security. Also, all history related to electronic financial transactions should be logged and kept. And, it should be considered to check the details of application access log and major information. In this paper, we take a real example of encryption and log audit for safe data transmission and periodic check.

A Real-Time Intrusion Detection based on Monitoring in Network Security (네트워크 보안에서 모니터링 기반 실시간 침입 탐지)

  • Lim, Seung-Cheol
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.9-15
    • /
    • 2013
  • Recently, Intrusion detection system is an important technology in computer network system because of has seen a dramatic increase in the number of attacks. The most of intrusion detection methods do not detect intrusion on real-time because difficult to analyze an auditing data for intrusions. A network intrusion detection system is used to monitors the activities of individual users, groups, remote hosts and entire systems, and detects suspected security violations, by both insider and outsiders, as they occur. It is learns user's behavior patterns over time and detects behavior that deviates from these patterns. In this paper has rule-based component that can be used to encode information about known system vulnerabilities and intrusion scenarios. Integrating the two approaches makes Intrusion Detection System a comprehensive system for detecting intrusions as well as misuse by authorized users or Anomaly users (unauthorized users) using RFM analysis methodology and monitoring collect data from sensor Intrusion Detection System(IDS).

Development and Review of Virtual Reality Fire-Training Program (공동주택 화재를 대상으로 한 가상현실(VR) 프로그램 개발 및 호응도 조사)

  • Kim, Yong-Cheol;Jeong, Mu-Heon;Lyu, Chung;Kim, Sun-Gyu
    • Fire Science and Engineering
    • /
    • v.33 no.6
    • /
    • pp.159-164
    • /
    • 2019
  • This study aims to minimize casualties in the event of an apartment fire by developing a virtual reality (VR) fire-training program (using the latest IT techniques) and verifying its validity as a learning tool. For this purpose, environmental parameters, such as the unit floor's size and the composition of the family, were established. Then, possible fire scenarios that could occur in the apartment building were developed and implemented in a VR setting. Finally, a survey was conducted to review the responses to the program. The results of the survey demonstrated that the responses were positive, confirming the effectiveness of the program.

Factors Affecting the Work Motivation of the Construction Project Manager

  • PHAN, Phuong Thanh;PHAM, Cuong Phu;TRAN, Nhu Thi Quynh;LE, Hang Thi Thu;NGUYEN, Hanh Thi Hong;NGUYEN, Quyen Le Hoang Thuy To
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.12
    • /
    • pp.1035-1043
    • /
    • 2020
  • Project manager plays a very important role in the success of any project. The primary duty of the project manager is to combine the outcomes or results of the various processes and activities of project management into a systematic project management strategy or plan for the project. In the construction industry, a lack of motivation is an urgent problem for many project managers in construction and engineering projects. Lack of motivation affects the quality and productivity of jobs, reducing profits and growth for companies, businesses, contractors or organizations that rely on human resources. The reasons for this lack of motivation are diverse ranging from salary to culture to life and working environment, among others. Through surveys and data analysis using Cronbach's Alpha reliability and EFA (Exploratory Factor Analysis), our research scaled the factors affecting work motivation of project managers in the construction industry in Vietnam. The research results identified six major groups of relevant factors including (i) salary and benefits, (ii) work environment, (iii) promotion opportunities, (iv) organizational culture, (v) interest in the job, and (vi) relationship with the organization. From there, this paper contributed useful information as well as measures for businesses, companies, contractors or organizations in the construction industry.

An Audit Model for Customer Relationship Management in Smart Mobile Environments (스마트 모바일 환경에서 고객관계관리 구축을 위한 감리 모형)

  • Chung, Woong;Kim, Dong Soo;Rhee, Hye Kyung;Kim, Hee Wan
    • Journal of Digital Convergence
    • /
    • v.11 no.5
    • /
    • pp.187-199
    • /
    • 2013
  • Since the supply of smart phones, a change in mobile environment brought a turning point called a mobile generation. Smart mobile office is a combined form of smart phones' new mobile environment and its social media. A construction of mobile office environment using smart phones brought revitalization of the smart phone market. CRM construction also became new requirements for a customer management. However, based on the current information system audit standard, check fields or check lists are insufficient to apply to audit for CRM construction in a smart mobile office environment. Therefore, this paper proposes a model for auditing CRM system construction in smart mobile office environment. It proposes audit domain and check lists of CRM construction. It also verified whether the proposed model is suitable or not by doing a survey if deduced audit domain and check lists correspond with the purpose of the CRM construction audit during smart mobile office environment. As the result, this study appear to have more than average satisfaction the suitability results were.

Establishment of ITS Policy Issues Investigation Method in the Road Section applied Textmining (텍스트마이닝을 활용한 도로분야 ITS 정책이슈 탐색기법 정립)

  • Oh, Chang-Seok;Lee, Yong-taeck;Ko, Minsu
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.15 no.6
    • /
    • pp.10-23
    • /
    • 2016
  • With requiring circumspections using big data, this study attempts to develop and apply the search method for audit issues relating to the ITS policy or program. For the foregoing, the auditing process of the board of audit and inspection was converged with the theoretical frame of boundary analysis proposed by William Dunn as an analysis tool for audit issues. Moreover, we apply the text mining technique in order to computerize the analysis tool, which is similar to the boundary analysis in the concept of approaching meta-problems. For the text mining analysis, specific model we applied the antisymmetry-symmetry compound lexeme-based LDA model based on the Latent Dirichlet Allocation(LDA) methodologies proposed by David Blei. The several prime issues were founded through a case analysis as follows: lack of collection of traffic information by the urban traffic information system, which is operated by the National Police Agency, the overlapping problems between the Ministry of Land, Infrastructure and Transport and the Advanced Traffic Management System and fabrication of the mileage on digital tachograph.

Development of System and Measured Results for Measuring Insulation Resistance of High-Power Cables in Operation (활선 고전력 케이블의 절연저항을 측정하기 위한 시스템 설계 및 측정결과)

  • Um, Kee-Hong;Kim, Bo-Kyeong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.4
    • /
    • pp.165-170
    • /
    • 2016
  • The XLPE(or CV) cables installed to deliver high electric power from generator at the power station have operating for the last 40 years in Korea. In 6-8 years from the time of initial operation, the cables in operation start a deteriorating process, depending on the installation and usage conditions. Some cables, even before 6-8 years from the installation, can cause accidents due to the faulty construction or other inadequate environments. In order to prevent cable accident in advance, the regular auditing of power cables are required. For a systematic realization of surveillance and prevention of accidents, we have invented a measuring device. In this paper, we present the device installed at Korean Western Power Co. Ltd., in order to detect the deterioration status of insulation resistances of dielectrics in the cables. We present that the measured results by the device we developed show the deteriorating processes in the cables in operation.