• Title/Summary/Keyword: Information Technology Audit

Search Result 110, Processing Time 0.025 seconds

Compression-Friendly Low Power Test Application Based on Scan Slices Reusing

  • Wang, Weizheng;Wang, JinCheng;Cai, Shuo;Su, Wei;Xiang, Lingyun
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.16 no.4
    • /
    • pp.463-469
    • /
    • 2016
  • This paper presents a compression-friendly low power test scheme in EDT environment. The proposed approach exploits scan slices reusing to reduce the switching activity during shifting for test scheme based on linear decompressor. To avoid the impact on encoding efficiency from resulting control data, a counter is utilized to generate control signals. Experimental results obtained for some larger ISCAS'89 and ITC'99 benchmark circuits illustrate that the proposed test application scheme can improve significantly the encoding efficiency of linear decompressor.

Transaction Mining for Fraud Detection in ERP Systems

  • Khan, Roheena;Corney, Malcolm;Clark, Andrew;Mohay, George
    • Industrial Engineering and Management Systems
    • /
    • v.9 no.2
    • /
    • pp.141-156
    • /
    • 2010
  • Despite all attempts to prevent fraud, it continues to be a major threat to industry and government. Traditionally, organizations have focused on fraud prevention rather than detection, to combat fraud. In this paper we present a role mining inspired approach to represent user behaviour in Enterprise Resource Planning (ERP) systems, primarily aimed at detecting opportunities to commit fraud or potentially suspicious activities. We have adapted an approach which uses set theory to create transaction profiles based on analysis of user activity records. Based on these transaction profiles, we propose a set of (1) anomaly types to detect potentially suspicious user behaviour, and (2) scenarios to identify inadequate segregation of duties in an ERP environment. In addition, we present two algorithms to construct a directed acyclic graph to represent relationships between transaction profiles. Experiments were conducted using a real dataset obtained from a teaching environment and a demonstration dataset, both using SAP R/3, presently the predominant ERP system. The results of this empirical research demonstrate the effectiveness of the proposed approach.

An Empirical Study on the Development Propensity and Quality of the Public Software Project (공공소프트웨어 사업의 개발 성향과 품질에 대한 실증적 연구)

  • Kim Yong Kyong;Kim Pyung Kee
    • Journal of Information Technology Applications and Management
    • /
    • v.11 no.4
    • /
    • pp.147-167
    • /
    • 2004
  • This study was empirically performed to demonstrate the development propensity and quality of the public software projects in Korea. Tile sample employed in this study contains 168 auditing reports on 107 public software projects which were carried out in the period of 1998 to 2003. The important findings of this study can be summarized as follows. The quality issue in the development process is getting more important with the lapse of time. In addition, the importance of end users' conveniency increases from year to year. Although the Pareto Principle(20 : 80 principle) is not applied strictly, most problems are caused by a few items. Finally, we find evidence that the overall Quality of public softwares is positively influenced by the information system auditing.

  • PDF

Study on IT security audit system for e-commerce private information protection (코일형 자계측정기용 센서의 특성)

  • Park, Geon-Ho
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.07a
    • /
    • pp.179-180
    • /
    • 2018
  • 자계 검출 센서는 여러 가지 종류가 있으나 벽면에 흐르는 미소 자계 및 차폐 전선에서 검출이 가능한 구조는 초전도 양자 간섭 소자(SQUID)가 주로 사용되지만 가격 및 물성 재료 특성으로 인하여 특수 용도로 사용되고 있다. 이에 본 연구에서는 전선으로부터 발생되는 저주파 자장을 검출할 수 있고 휴대성 및 가격이 저렴한 구조인 코일형 자계측정기를 개발하기 위해 자기 코어 및 코일 Turn수 변화에 따른 자계 검출 감도를 조사하여 최적의 구조를 설정하였다.

  • PDF

Convergence Security Provider Self-Conformity System (융합보안 공급자 자기 적합성 제도)

  • Baik, Namkyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.2
    • /
    • pp.53-61
    • /
    • 2019
  • In this paper, we propose 'a self - conformance system of convergence security provider' to provide basic data for security and reliability of convergence industrial technology, system and service. It is difficult to evaluate convergence security systems, limited to information and communication service providers, unable to check convergence security items, burden of submission documents, difficulty in measuring convergence security service level and we will summarize product and service-based requirements that can be integrated and systematically measure the level of convergence security and define renewed life cycle-based convergence security information and content security and assurance requirements. On the basis of this, each convergence security company declares conformity with the standard itself without the certification of the certification body, and introduces the provider conformity certification system which can manufacture and sell. This will enable the company to strengthen its competitiveness through timely launch and implementation of products and services and cost reduction.

Optimization of the Educational Environment Using Information Technologies

  • Sherman, Mykhailo;Martynyshyn, Yaroslav;Khlystun, Olena;Chukhrai, Liubov;Kliuchko, Yuliia;Savkiv, Uliana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.80-83
    • /
    • 2021
  • The article analyzes and shows the rapid development information and telecommunication technologies, and their capabilities are becoming unprecedented for human development, effective solutions to many professional problems. The analysis of information and communication technologies of education used in higher educational institutions of Ukraine confirmed that for the effective use of special teaching methods, as well as software and technical teaching aids, it is necessary to have a trained teaching staff and students.

A Study on organization of work paper for Evaluation of Information System Audit Results (감리결과 평가를 위한 감리조서 작성방안 연구)

  • Roh, Kab-Chul
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.501-504
    • /
    • 2007
  • 2002 년 미국의 회계부정 문제에 기인해 감사조서의 작성 및 수정, 보관에 관한 규정이 강화되었다. 따라서, 회계감사의 일부로 수행되는 전산감사도 이 규정에 따라 전산 감사조서의 작성이 강화되었다. 최근 정부는 공공기관에서 발주하는 일정규모 이상의 정보화 프로젝트에 대한 감리를 의무화하였으며, 공공부분의 정보시스템 감리는 점차 확대되어 감리시장이 성숙단계에 이르는 것으로 평가되고 있다. 본 연구에서는 정보시스템 감리수행 결과를 평가하기 위한 감리조서의 구성방안을 제안한다. 기존 감리보고서의 불분명한 감리전략과 감리 결과를 지지하는 증거가 불충분한 문제점을 보완하여 감리전략에 기반한 감리조서의 구성을 제안한다. 이는 기존의 감리절차 진행과정에 감리조서 작성을 추가/보완함으로써 기존의 감리절차를 유지하면서도 감리보고서의 신뢰성을 증진한다.

A Study about Wiretapping Attack and Security of VoIP Service (VoIP 서비스의 도청 공격과 보안에 관한 연구)

  • Park Dea-Woo;Yoon Seok-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.4 s.42
    • /
    • pp.155-164
    • /
    • 2006
  • VoIP technology is Eight New Services among Ubiquitous-IT839 strategies. This paper tested wiretapping or VoIP service in connected a soft phone and LAN and WAN sections, Internet telephones and a device. IP PBX, a banner operator network to have been connected to VoIP Internet network. As a result of having experimented on wiretapping of VoIP networks, Vulnerability was found. and a wiretapping by attacks of a hacker was succeeded in a terminal and proxy and attachment points of a VoIP network like a hub to follow a CVE list. Currently applied a security plan of an each wiretapping section in viewpoints of 6 security function of Access Control. Confidentiality, Authentication. Availability, Integrity. Non-repudiation in VoIP networks named to 070. Prevented wiretapping of contents by the results, the AES encryption that executed wiretapping experiment about a packet after application of a security plan. Prevented wiretapping, and kept security and audit log. and were able to accomplish VoIP information protection to network monitoring and audit log by an access interception and qualification and message hash functions and use of an incoming refusal.

  • PDF

Cloud-Based Accounting Adoption in Jordanian Financial Sector

  • ELDALABEEH, Abdel Rahman;AL-SHBAIL, Mohannad Obeid;ALMUIET, Mohammad Zayed;BANY BAKER, Mohammad;E'LEIMAT, Dheifallah
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.2
    • /
    • pp.833-849
    • /
    • 2021
  • Cloud accounting represents a new area of accounting information systems. Past research has often focused on accounting information systems and its antecedents, rather than factors that adopt cloud accounting system. The purpose of this paper is to explain the factors that influence the adoption of cloud accounting in the financial sectors. This paper applied the technology acceptance model (TAM), technology-organization-environment, and the De Lone and Mc Lean model, coupled with proposed factors relevant to cloud accounting. The proposed model was empirically evaluated using survey data from 187 managers (financial managers, IT department managers, audit managers, heads of accounting departments, and head of internal control departments) in Jordanian bank branches. Based on the SEM results, top management support, organizational competency, service quality, system quality, perceived usefulness, and perceived ease of use had a positive relationship with the intention of using cloud accounting. Cloud accounting adoption positively affected cloud accounting usage. This paper contributes to a theoretical understanding of factors that activate the adoption of cloud accounting. For financial firms in general the results enable them to better develop cloud accounting framework. The paper verifies the factors that affect the adoption of cloud accounting and the proposed cloud accounting model.

A Precursor Phenomena Analysis of APT Hacking Attack and IP Traceback (APT 해킹 공격에 대한 전조현상 분석 및 IP역추적)

  • Noh, Jung Ho;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.275-278
    • /
    • 2013
  • Log is a file system, a system that uses all remaining data. Want situation now being issued in the IT, media Nate on information disclosure, the press agency server hack by numbness crime occurred. Hacking crisis that's going through this log analysis software professionally for professional analysis is needed. The present study, about APT attacks happening intelligently Log In case of more than traceback in advance to prevent the technology to analyze the pattern for log analysis techniques.

  • PDF